Warning: Permanently added '10.128.0.191' (ECDSA) to the list of known hosts. 2019/05/01 10:12:02 fuzzer started [ 50.958102][ T26] audit: type=1400 audit(1556705522.804:36): avc: denied { map } for pid=7936 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/05/01 10:12:05 dialing manager at 10.128.0.26:44901 2019/05/01 10:12:06 syscalls: 2463 2019/05/01 10:12:06 code coverage: enabled 2019/05/01 10:12:06 comparison tracing: enabled 2019/05/01 10:12:06 extra coverage: extra coverage is not supported by the kernel 2019/05/01 10:12:06 setuid sandbox: enabled 2019/05/01 10:12:06 namespace sandbox: enabled 2019/05/01 10:12:06 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 10:12:06 fault injection: enabled 2019/05/01 10:12:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 10:12:06 net packet injection: enabled 2019/05/01 10:12:06 net device setup: enabled 10:13:50 executing program 0: [ 158.563174][ T26] audit: type=1400 audit(1556705630.414:37): avc: denied { map } for pid=7951 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=99 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 158.652173][ T7952] IPVS: ftp: loaded support on port[0] = 21 10:13:50 executing program 1: [ 158.758415][ T7952] chnl_net:caif_netlink_parms(): no params data found [ 158.851668][ T7952] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.859888][ T7952] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.868107][ T7952] device bridge_slave_0 entered promiscuous mode [ 158.877373][ T7952] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.885554][ T7952] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.893581][ T7952] device bridge_slave_1 entered promiscuous mode [ 158.928234][ T7955] IPVS: ftp: loaded support on port[0] = 21 [ 158.937563][ T7952] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 158.949061][ T7952] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 158.973600][ T7952] team0: Port device team_slave_0 added [ 158.983606][ T7952] team0: Port device team_slave_1 added 10:13:50 executing program 2: [ 159.072825][ T7952] device hsr_slave_0 entered promiscuous mode [ 159.130207][ T7952] device hsr_slave_1 entered promiscuous mode 10:13:51 executing program 3: [ 159.239616][ T7957] IPVS: ftp: loaded support on port[0] = 21 [ 159.311774][ T7952] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.319047][ T7952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.327051][ T7952] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.334629][ T7952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.385006][ T7955] chnl_net:caif_netlink_parms(): no params data found 10:13:51 executing program 4: [ 159.465083][ T7961] IPVS: ftp: loaded support on port[0] = 21 [ 159.548907][ T7952] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.560672][ T7955] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.567817][ T7955] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.578803][ T7955] device bridge_slave_0 entered promiscuous mode [ 159.608723][ T7952] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.621075][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.636231][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.672503][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.684611][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 159.700788][ T7955] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.707915][ T7955] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.718863][ T7955] device bridge_slave_1 entered promiscuous mode [ 159.746113][ T7964] IPVS: ftp: loaded support on port[0] = 21 [ 159.755186][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.764884][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.772113][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.784813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 10:13:51 executing program 5: [ 159.793738][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.800989][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.839379][ T7957] chnl_net:caif_netlink_parms(): no params data found [ 159.857609][ T7955] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.883998][ T7955] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 159.918114][ T7955] team0: Port device team_slave_0 added [ 159.929190][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.942701][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.969605][ T7955] team0: Port device team_slave_1 added [ 159.985998][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.002977][ T7957] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.011244][ T7957] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.018992][ T7957] device bridge_slave_0 entered promiscuous mode [ 160.027222][ T7957] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.034995][ T7957] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.043070][ T7957] device bridge_slave_1 entered promiscuous mode [ 160.068901][ T7957] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 160.077990][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.086781][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.115474][ T7967] IPVS: ftp: loaded support on port[0] = 21 [ 160.171809][ T7955] device hsr_slave_0 entered promiscuous mode [ 160.210413][ T7955] device hsr_slave_1 entered promiscuous mode [ 160.261634][ T7957] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 160.298215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.307347][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.341875][ T7957] team0: Port device team_slave_0 added [ 160.357806][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 160.369206][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 160.379024][ T7957] team0: Port device team_slave_1 added [ 160.392679][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 160.413467][ T7961] chnl_net:caif_netlink_parms(): no params data found [ 160.511734][ T7957] device hsr_slave_0 entered promiscuous mode [ 160.570209][ T7957] device hsr_slave_1 entered promiscuous mode [ 160.664512][ T7961] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.672231][ T7961] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.680405][ T7961] device bridge_slave_0 entered promiscuous mode [ 160.718358][ T7961] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.726554][ T7961] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.734586][ T7961] device bridge_slave_1 entered promiscuous mode [ 160.744754][ T7964] chnl_net:caif_netlink_parms(): no params data found [ 160.754489][ T7952] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 160.774299][ T7967] chnl_net:caif_netlink_parms(): no params data found [ 160.804358][ T26] audit: type=1400 audit(1556705632.654:38): avc: denied { associate } for pid=7952 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 160.825225][ T7955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.865933][ T7961] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 160.884466][ T7955] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.919047][ T7961] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 160.956159][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 10:13:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000023c0)={[{0x9}]}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000000)) [ 160.964566][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.983624][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.988291][ T7976] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 161.006948][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.020381][ T7968] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.027507][ T7968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.061567][ T7964] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.068896][ T7964] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.077540][ T7964] device bridge_slave_0 entered promiscuous mode [ 161.089069][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.106056][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.115801][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.130692][ T7968] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.137845][ T7968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.151561][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 10:13:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000340)=""/253) [ 161.164274][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.199008][ T7967] bridge0: port 1(bridge_slave_0) entered blocking state 10:13:53 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) memfd_create(&(0x7f0000000180)='GPL\x00', 0x6) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x4000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000000c0)=0x2) [ 161.212921][ T7967] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.223462][ T7967] device bridge_slave_0 entered promiscuous mode [ 161.234419][ T7967] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.244786][ T7967] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.255798][ T7967] device bridge_slave_1 entered promiscuous mode [ 161.272189][ T7964] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.279423][ T7964] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.286969][ T26] audit: type=1400 audit(1556705633.134:39): avc: denied { prog_load } for pid=7984 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 161.319691][ T7964] device bridge_slave_1 entered promiscuous mode [ 161.330988][ T26] audit: type=1400 audit(1556705633.184:40): avc: denied { prog_run } for pid=7984 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 161.361541][ T7961] team0: Port device team_slave_0 added 10:13:53 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff73, 0x101000) connect$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x90db, 0x220000) write$cgroup_int(r1, &(0x7f0000000080)=0x2, 0x12) [ 161.379553][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.389252][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.423296][ T7967] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 161.438134][ T7967] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 161.461850][ T7961] team0: Port device team_slave_1 added 10:13:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x4e22, @local}}) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) [ 161.470968][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.506111][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.515959][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.533660][ T7955] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 161.545863][ T7955] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 10:13:53 executing program 0: r0 = socket$kcm(0x10, 0xffdffffffffffffb, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x7fffffff, 0x30, 0x6, 0x5}, &(0x7f0000000100)=0x18) rt_sigsuspend(&(0x7f0000000280)={0xfffffffffffffffc}, 0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={r2, 0x80}, &(0x7f0000000180)=0x8) r4 = accept4$netrom(r1, &(0x7f00000002c0)={{0x3, @bcast}, [@null, @rose, @bcast, @remote, @netrom, @netrom, @remote, @netrom]}, &(0x7f0000000340)=0x48, 0x80800) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x2, 0x0, 0x6}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000400)={'gretap0\x00', {0x2, 0x4e23, @broadcast}}) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000380)={r3, 0x4}, &(0x7f00000003c0)=0x8) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000004c0)="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", 0x145}], 0x1}, 0x0) ioctl$SG_GET_NUM_WAITING(r4, 0x227d, &(0x7f0000000440)) [ 161.558848][ T7964] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 161.580704][ T7964] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 161.598236][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.616761][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.625473][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.639356][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.657789][ T7955] 8021q: adding VLAN 0 to HW filter on device batadv0 10:13:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) prctl$PR_GET_DUMPABLE(0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="d708080000000000e3fdfeffffffffff1800000002000000000000000900"], &(0x7f0000000080)='syzkaller\x00', 0xc84d, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x101, 0x1f}, 0x8, 0x10, &(0x7f0000000100)={0x8, 0x8, 0x4, 0x3}, 0x10}, 0x70) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)=r2) sendmmsg$inet_sctp(r0, &(0x7f000093eee8)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x203}}], 0x20}], 0x1, 0x0) [ 161.672447][ T7967] team0: Port device team_slave_0 added [ 161.711739][ T7961] device hsr_slave_0 entered promiscuous mode [ 161.730348][ T7961] device hsr_slave_1 entered promiscuous mode [ 161.774600][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.789004][ T7967] team0: Port device team_slave_1 added [ 161.804440][ T7964] team0: Port device team_slave_0 added [ 161.814579][ T7957] 8021q: adding VLAN 0 to HW filter on device bond0 10:13:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)=0xbf6) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x8001, 0x90000) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80001, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0600660300000000000000004746862d74017397671c861721470a354eb34b6828605b637aa434c481f28ffb0fd2cf3776357b944200a87777fb6ec6a0a829a0a802e5cb69afa432cf8042d5bdaa5e461f6de5952773d6e5ba136a4554a7ca9f1660a027ee3f07bbb7da28438f57ab6c66e8479fcd15b949e141b8b3cb3f3eaeebf95967a9ec66505ed5687def36a68ff344f802496e7d54108329d62a58a2c12f44edc27e"]) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000240)={r2, 0x2, &(0x7f0000000100)=[0x3, 0x80], &(0x7f0000000140)=[0x7, 0x8, 0x1, 0x1f, 0x5], 0x2, 0x8, 0x9, &(0x7f0000000180)=[0xfa3, 0x2, 0x0, 0x6, 0x1ff, 0x6, 0x6d, 0x0], &(0x7f0000000200)=[0x100, 0x4, 0x960]}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)=0x19) ioctl$TCSETS(r0, 0x5437, 0x0) [ 161.854622][ T7964] team0: Port device team_slave_1 added [ 161.952844][ T7967] device hsr_slave_0 entered promiscuous mode [ 161.990242][ T7967] device hsr_slave_1 entered promiscuous mode [ 162.057516][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.065637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.093408][ T7957] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.172795][ T7964] device hsr_slave_0 entered promiscuous mode [ 162.230376][ T7964] device hsr_slave_1 entered promiscuous mode [ 162.281992][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.290577][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.299507][ T7968] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.306616][ T7968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.314775][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.323953][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.332594][ T7968] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.339672][ T7968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.347890][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.378086][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.387244][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.395817][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.404703][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.413077][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.421690][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.430297][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.455738][ T7957] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 162.467073][ T7957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.483095][ T7961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.500378][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.508973][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.521868][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.532714][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.541422][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.567789][ T7961] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.579756][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.587927][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.608689][ T7967] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.617254][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.629586][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.638806][ T7960] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.646000][ T7960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.654593][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.663713][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.672544][ T7960] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.680001][ T7960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.688769][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.717240][ T7967] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.725005][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.734405][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.743482][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.752526][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.761435][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.770590][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.780841][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.788494][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.797753][ T7957] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.814677][ T7964] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.825064][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.833579][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.842780][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 10:13:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaafe030000000086dd60b409000004330002000000000000000000ffffe0000002ff020000000000000000000000000001880090780009290060b680fa3a0e2ffb700000000000000000000080000000ffffffffffff00000000000000000000ff"], 0x0) [ 162.882372][ T7964] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.900037][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.909606][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.925272][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.936557][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.952750][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.960003][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.968229][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.977498][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.986449][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.993540][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.005025][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.013797][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.022540][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.030292][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.038732][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.047228][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.074687][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.085134][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.094809][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.105404][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.116265][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.124900][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.133914][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.141281][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.149121][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.158294][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.166963][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.174103][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.182331][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.191402][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.200301][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.208714][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.218403][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.226490][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.234596][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.253221][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.261946][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.270531][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.279060][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.288129][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.296707][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.304961][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.313368][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.324115][ T7967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.336003][ T7964] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 163.348232][ T7964] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.371082][ T7961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.378335][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.389488][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.405083][ T7967] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.441560][ T7964] 8021q: adding VLAN 0 to HW filter on device batadv0 10:13:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000000c0)=0xe45504692e024d94, 0x4) ioctl$TIOCSTI(r1, 0x5412, 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x2, 0x0, 0x2}}, 0x2e) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) getpeername(r3, 0x0, &(0x7f0000000240)) 10:13:55 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20\x00', 0x100, 0x0) getsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r1 = socket$inet6(0xa, 0x10000001, 0x5) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e20, 0x8, @rand_addr="eb8449fd35ae26dede3c8d0c69e6080b", 0x8}, {0xa, 0x4e20, 0x1000, @local, 0xf9}, 0x7, [0x3ff0000000000, 0x9, 0x10000, 0x0, 0x4b8, 0x4, 0x4, 0xdb]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @loopback}, 0x1000}, 0x5c) 10:13:55 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x7, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x80) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000240)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x6, &(0x7f00000000c0)=0x2) 10:13:55 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/context\x00', 0x2, 0x0) connect$inet(r0, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$xdp(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000a00)="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", 0x480, 0x0, 0x0, 0x0) close(r0) 10:13:55 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x44) lseek(r0, 0x0, 0x0) 10:13:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000080)={0x9, 0x7fff}) write(0xffffffffffffffff, &(0x7f0000000000)="2200000021000707000000000900e4010200001e00000000ff0804000500158002af", 0x22) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f00000000c0)) 10:13:55 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) fgetxattr(r0, &(0x7f0000000080)=@known='com.apple.system.Security\x00', &(0x7f0000000200)=""/60, 0x3c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x1, 0x8}, &(0x7f00000003c0)=0x90) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={r2, 0x7ff}, 0x8) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x66fb, 0x40) ioctl$SIOCX25SCAUSEDIAG(r4, 0x89ec, &(0x7f0000000280)={0xce, 0x9}) write$UHID_CREATE2(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797b3020000017005a3a000000000000000000000000000000000000006100000000000000000cac0000f7ff00000000000000f9000000000000000000000073797a3100000000000000000000000000c70080238e2100000000000000000000000000000000000000000000eddfffffffffffff00000000000000000000000000000000000000020000000800000000000000"], 0x118) 10:13:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000140)=0x7f, 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000008c0)={0x4, 0x0, [{0x1000, 0xcc, &(0x7f0000000180)=""/204}, {0x0, 0x34, &(0x7f0000000040)=""/52}, {0x0, 0xf8, &(0x7f0000000400)=""/248}, {0x0, 0x12, &(0x7f0000000080)=""/18}]}) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000700)=ANY=[]) 10:13:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80800) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000300)={r2, 0x5e4}, &(0x7f0000000340)=0xc) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_execute_func(&(0x7f0000000140)="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") 10:13:55 executing program 3: prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x8}}, 0x18) 10:13:55 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/context\x00', 0x2, 0x0) connect$inet(r0, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$xdp(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000a00)="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", 0x480, 0x0, 0x0, 0x0) close(r0) 10:13:55 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x7, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x80) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000240)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x6, &(0x7f00000000c0)=0x2) 10:13:55 executing program 2: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x3f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x1fe) r1 = syz_open_dev$admmidi(&(0x7f0000000ac0)='/dev/admmidi#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000b00)={0x100, @time={0x77359400}, 0x82c8, {0x3, 0x5}, 0x3, 0x1, 0x400}) r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x1, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x14, &(0x7f0000000a00)=""/160, &(0x7f0000000500)=0xa0) r3 = syz_open_dev$video(0x0, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000900)='/dev/binder#\x00', 0x0, 0x802) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) getegid() fcntl$setstatus(r0, 0x4, 0x40000) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000980)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) 10:13:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="000166696c65302f66696c65305a69456fea3100fd1c6a4d26dd652f88442e403fad69220ae7d6da3612be3a7cd1fb49cc69a05a21208d0b83fd0115d92a5522381bf4852f58c7638efe727a9aa49127136b903e0d83a0004d11bfa36f2819cc54498c4ca77d3cb8cfdf607ae1ebaf398ff597cee25ed715ec426c3e35eed80755573ca9b39ed05fdd429d1fe182213e560e3904505dd6ab01d231c0d8db4f8b181aeafd217db1a8593c5b6b3a44cd5c7984ad147ab35831719742605bfd"], &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x201000, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) 10:13:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x40, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000140)={0x1000, ""/4096}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000080)=0x101, 0x8) ioctl(r1, 0xffffffffffffffc8, &(0x7f00000007c0)) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f00000000c0)=0x71, 0x4) 10:13:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x10c00) write$9p(r2, &(0x7f0000000040), 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x10200, 0x0, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000000c0)={0x81, 0x0, [0xfffffffffffffffa, 0x0, 0x6, 0x1]}) 10:13:55 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x7, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x80) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000240)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x6, &(0x7f00000000c0)=0x2) [ 164.016793][ C0] hrtimer: interrupt took 74957 ns 10:13:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x5, 0x4, 0x4a}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x1, 0x0, 0x400000, 0x0, 0x10020000000, 0x0}, 0x3c) 10:13:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x220400, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 10:13:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="baa000edf26df20f080347640f0058d5640f320f381dec0f221b8d4e9c66b80500000066b94a7b00000f01c1", 0x2c}], 0x1, 0xfffffffffffffffd, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 164.075183][ T26] audit: type=1400 audit(1556705635.924:41): avc: denied { create } for pid=8066 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:13:56 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x7, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x80) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000240)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x6, &(0x7f00000000c0)=0x2) [ 164.190684][ T26] audit: type=1400 audit(1556705636.044:42): avc: denied { map_create } for pid=8083 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 10:13:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="4acb"]) open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="47e98831d018"], 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x454000, 0x0) getsockopt$sock_buf(r3, 0x1, 0x3f, &(0x7f0000000180)=""/229, &(0x7f0000000040)=0xe5) open(&(0x7f0000000100)='./file0\x00', 0x4000, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:13:56 executing program 4: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f00000002c0)={'system_u:object_r:newrole_exec_t:s0', 0x20, 'system_u:object_r:systemd_tmpfiles_exec_t:s0', 0x20, 0x0, 0x20, 'unconfine\x0er:insmod_t:s0-s0:c0.c\x81\x00\x00\xb1\xe9M0M\x12|\x7f\xef\xa7\xc5K\x8f\b\xe8#0NX\xe2\xbd\xbe\x8f\x04\xd7)\xed\"u,ye\xbfm.\xeb\x14*\xd6\x17\xc2\x00\x00\x00\x00\x00\x00\xaf\xadS57 <\xc5$\xe9\xa0\xa3\xc6u\x129\xcd\xd5\b\xc5\xe1\x0fa\xdf\xa0\xc2\x9b\xb9r\xc1\xbfEc\xf4\xbb\xf7X\xcfw\f}!eG0\xf2\xd9\xd8\xab\xc5V\x9es_\x92R\xee\x1d\x1e\xeb\xe2E\xb6Q\b\xb8\xef\v\xcdOm\x90{2\xd4\x9d,\x97\ah0\x98\xfc\xb5,\xa5.\xed\r\xfb}x\xd4\xea\x98\xedZ\v\xd9t\xa2\x8cG\xda^\xdb\x00'/212}, 0x13a) 10:13:56 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x19, 0x0, 0x115) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x111000) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000140)={@empty, 0x0}, &(0x7f0000000180)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)=@expire={0x100, 0x18, 0x4, 0x70bd25, 0x25dfdbfc, {{{@in=@broadcast, @in6=@rand_addr="2712b0bf50b6359911be712289463ccd", 0x4e22, 0xfffffffffffffe01, 0x4e21, 0x5, 0x2, 0x20, 0x20, 0x5e, r1, r2}, {@in6=@loopback, 0x4d4, 0xff}, @in6=@mcast1, {0xff, 0x3, 0x100, 0x800, 0xffffffffffffffff, 0x4, 0x80, 0xffff}, {0x1, 0x7, 0xfff, 0x3}, {0x3ff, 0xff, 0x3}, 0x70bd2b, 0x3506, 0x0, 0x3, 0x80, 0x4}, 0x2}, [@output_mark={0x8, 0x1d, 0x100000001}]}, 0x100}, 0x1, 0x0, 0x0, 0x40000}, 0x4040010) [ 164.429161][ T26] audit: type=1400 audit(1556705636.274:43): avc: denied { validate_trans } for pid=8103 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 10:13:56 executing program 2: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x3f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x1fe) r1 = syz_open_dev$admmidi(&(0x7f0000000ac0)='/dev/admmidi#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000b00)={0x100, @time={0x77359400}, 0x82c8, {0x3, 0x5}, 0x3, 0x1, 0x400}) r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x1, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x14, &(0x7f0000000a00)=""/160, &(0x7f0000000500)=0xa0) r3 = syz_open_dev$video(0x0, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000900)='/dev/binder#\x00', 0x0, 0x802) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) getegid() fcntl$setstatus(r0, 0x4, 0x40000) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000980)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) 10:13:56 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x7, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x80) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000240)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 10:13:56 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0xfffffffffffffff8, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) openat$tun(0xffffffffffffff9c, 0x0, 0x200, 0x0) 10:13:56 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x400000000000246) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300"], 0x2) close(r0) 10:13:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0xfffffffffffffffa, 0x4) r1 = syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$mice(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r3, &(0x7f0000000780)={0x26, 'skcipher\x00', 0x0, 0x0, 'fpu(pcbc(aes-aesni))\x00'}, 0x58) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = semget$private(0x0, 0x3, 0x8) semctl$GETPID(r6, 0x0, 0xb, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x6000600, 'lblcr\x00'}, 0x2c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) r8 = msgget(0x1, 0x664) getgroups(0x1, &(0x7f0000000340)=[0xffffffffffffffff]) set_thread_area(&(0x7f00000000c0)={0x10000, 0x1000, 0x0, 0x9, 0x3ec0, 0x1, 0x1f, 0x81, 0x1, 0x5}) geteuid() lstat(&(0x7f0000000100)='./file0\x00', 0x0) getpgid(0x0) fcntl$getownex(r4, 0x10, 0x0) msgctl$IPC_STAT(r8, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}], 0x1, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000400)={0x0, 0x0, {0x0, 0x0, 0x0, 0x12, 0x0, 0xff}}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="e1ffffffffffff504e44f0158237ffff001e000019000000ffff42ffffff00000000e410776675b04a9cf8522d0f4854f9392400080000c00392aecb"], 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 10:13:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xffffffffffffffb1, &(0x7f0000000040)="0adc1f12a4ca6ff7d9418dfe3c123f319bd070") r1 = socket$inet6(0xa, 0x4000000000000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xd}, 0x1c) sendmmsg(r1, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e20, @multicast2=0xe000006a}, 0x80, 0x0}}], 0x300, 0x0) 10:13:56 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x7, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x80) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 164.832832][ T8127] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:13:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='rose0\x00', 0x10) close(r2) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) getsockopt(r1, 0x3, 0x10000, &(0x7f00000001c0)=""/41, &(0x7f0000000200)=0x29) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000080)=0x6, 0x4) 10:13:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0xfffffffffffffffa, 0x4) r1 = syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$mice(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r3, &(0x7f0000000780)={0x26, 'skcipher\x00', 0x0, 0x0, 'fpu(pcbc(aes-aesni))\x00'}, 0x58) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = semget$private(0x0, 0x3, 0x8) semctl$GETPID(r6, 0x0, 0xb, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x6000600, 'lblcr\x00'}, 0x2c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) r8 = msgget(0x1, 0x664) getgroups(0x1, &(0x7f0000000340)=[0xffffffffffffffff]) set_thread_area(&(0x7f00000000c0)={0x10000, 0x1000, 0x0, 0x9, 0x3ec0, 0x1, 0x1f, 0x81, 0x1, 0x5}) geteuid() lstat(&(0x7f0000000100)='./file0\x00', 0x0) getpgid(0x0) fcntl$getownex(r4, 0x10, 0x0) msgctl$IPC_STAT(r8, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}], 0x1, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000400)={0x0, 0x0, {0x0, 0x0, 0x0, 0x12, 0x0, 0xff}}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="e1ffffffffffff504e44f0158237ffff001e000019000000ffff42ffffff00000000e410776675b04a9cf8522d0f4854f9392400080000c00392aecb"], 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 10:13:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x100000000000021c}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x310, 0x70bd25, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x95}, 0x8000) 10:13:57 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x7, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x80) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) 10:13:57 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0xfffffffffffffff8, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) openat$tun(0xffffffffffffff9c, 0x0, 0x200, 0x0) 10:13:57 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0xfffffffffffffffa, 0x4) r1 = syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$mice(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r3, &(0x7f0000000780)={0x26, 'skcipher\x00', 0x0, 0x0, 'fpu(pcbc(aes-aesni))\x00'}, 0x58) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = semget$private(0x0, 0x3, 0x8) semctl$GETPID(r6, 0x0, 0xb, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x6000600, 'lblcr\x00'}, 0x2c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) r8 = msgget(0x1, 0x664) getgroups(0x1, &(0x7f0000000340)=[0xffffffffffffffff]) set_thread_area(&(0x7f00000000c0)={0x10000, 0x1000, 0x0, 0x9, 0x3ec0, 0x1, 0x1f, 0x81, 0x1, 0x5}) geteuid() lstat(&(0x7f0000000100)='./file0\x00', 0x0) getpgid(0x0) fcntl$getownex(r4, 0x10, 0x0) msgctl$IPC_STAT(r8, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}], 0x1, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000400)={0x0, 0x0, {0x0, 0x0, 0x0, 0x12, 0x0, 0xff}}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="e1ffffffffffff504e44f0158237ffff001e000019000000ffff42ffffff00000000e410776675b04a9cf8522d0f4854f9392400080000c00392aecb"], 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 10:13:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0xfffffffffffffffa, 0x4) r1 = syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$mice(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r3, &(0x7f0000000780)={0x26, 'skcipher\x00', 0x0, 0x0, 'fpu(pcbc(aes-aesni))\x00'}, 0x58) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = semget$private(0x0, 0x3, 0x8) semctl$GETPID(r6, 0x0, 0xb, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x6000600, 'lblcr\x00'}, 0x2c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) r8 = msgget(0x1, 0x664) getgroups(0x1, &(0x7f0000000340)=[0xffffffffffffffff]) set_thread_area(&(0x7f00000000c0)={0x10000, 0x1000, 0x0, 0x9, 0x3ec0, 0x1, 0x1f, 0x81, 0x1, 0x5}) geteuid() lstat(&(0x7f0000000100)='./file0\x00', 0x0) getpgid(0x0) fcntl$getownex(r4, 0x10, 0x0) msgctl$IPC_STAT(r8, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}], 0x1, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000400)={0x0, 0x0, {0x0, 0x0, 0x0, 0x12, 0x0, 0xff}}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="e1ffffffffffff504e44f0158237ffff001e000019000000ffff42ffffff00000000e410776675b04a9cf8522d0f4854f9392400080000c00392aecb"], 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 10:13:57 executing program 3: unshare(0x6c060000) msgget$private(0x0, 0x28e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) fcntl$setflags(r0, 0x2, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = accept(r0, &(0x7f0000000000)=@ax25={{0x3, @rose}, [@null, @default, @bcast, @bcast, @rose, @netrom, @default, @rose]}, &(0x7f0000000080)=0x80) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000180)=0x800, 0x4) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f00000001c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000240)="d8e8837bbca13ee0b3ec9fe302164732b08587f666d0b209379166e970c0820171ae15d9ef74a763ba630c142ffdf24bc9c493fd081a8373d3c40bdfc121f813ec0bd645d99119b917955e9b212e27cc451cf26fcaa1012bc377dd7e7ef7ca352d2020871f085e770881921835cee20bb397f8812d01ec22ef1a0f32730f0e558abfae0eda9ebda7aa3da3775e3cb773a0eb88f807d9f6a78f43f232e52b033a41f8c377264d4d7aff9cbd3b5489df05964247ede67f611e18075794803808a499dbee2d", 0xc4}], 0x1, &(0x7f0000000380)=[{0x38, 0x113, 0x5, "dda0495074b8a93d24f98ca8eb20e3f76ebe3e79bb886c1bba5aa5c70603bfc5ba85"}], 0x38}, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00\x06\x00\x03\xfa\x01\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, &(0x7f0000000140)=0x54) [ 165.360263][ T8158] IPVS: ftp: loaded support on port[0] = 21 10:13:57 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x7, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x80) 10:13:57 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0xfffffffffffffffa, 0x4) r1 = syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$mice(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r3, &(0x7f0000000780)={0x26, 'skcipher\x00', 0x0, 0x0, 'fpu(pcbc(aes-aesni))\x00'}, 0x58) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = semget$private(0x0, 0x3, 0x8) semctl$GETPID(r6, 0x0, 0xb, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x6000600, 'lblcr\x00'}, 0x2c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) r8 = msgget(0x1, 0x664) getgroups(0x1, &(0x7f0000000340)=[0xffffffffffffffff]) set_thread_area(&(0x7f00000000c0)={0x10000, 0x1000, 0x0, 0x9, 0x3ec0, 0x1, 0x1f, 0x81, 0x1, 0x5}) geteuid() lstat(&(0x7f0000000100)='./file0\x00', 0x0) getpgid(0x0) fcntl$getownex(r4, 0x10, 0x0) msgctl$IPC_STAT(r8, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}], 0x1, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000400)={0x0, 0x0, {0x0, 0x0, 0x0, 0x12, 0x0, 0xff}}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="e1ffffffffffff504e44f0158237ffff001e000019000000ffff42ffffff00000000e410776675b04a9cf8522d0f4854f9392400080000c00392aecb"], 0x0) socket$vsock_stream(0x28, 0x1, 0x0) [ 165.387956][ T26] audit: type=1400 audit(1556705637.234:44): avc: denied { write } for pid=8160 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 165.419726][ T26] audit: type=1400 audit(1556705637.234:45): avc: denied { read } for pid=8160 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:13:57 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x80000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0xa4, &(0x7f0000000180)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e21, @rand_addr=0xfe}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x4e22, 0x4, @mcast2, 0x3ff}, @in6={0xa, 0x4e23, 0x4, @mcast1, 0x7}, @in6={0xa, 0x4e22, 0x2, @mcast2, 0x5}]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000002c0)={r1, 0x7, 0x6b, "9e9868c3585982aaec61bb7036e9dff8f6b38e2ac1b67722a056a1169b48e9d75d01bdb83321d26f181f010680ab6b979575dc92c63cfebe3b3498f6e69e4e4583e23a78cde332a733b5df5c5046bf8be83c5618ca3bdb085f8036e8b4988a90f0711518734672b9918fef"}, 0x73) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="74720300000066642c7266646e6f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',version=9p2000,u,\x00']) 10:13:57 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) pwrite64(r0, &(0x7f0000000280)="8ec5b2e084491be59902d69a7c11860416717f7b76ae5f3c6f8a72f900257a4ba2f78ff7b8e83188f1295cc5be538f18cabcd3df1465c5b537a0836daf2d74b53dd6646da005337dba096ac5167f04aa9b8a61d7b6c029f27ee650f3a4a3a2c268be32eaff6b074527227ac07e4a5227c5fca51c89245f5547ee4b25fd926b9f3e3a3a610719d1714f1572a2451857beb46d730615", 0x95, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x1, &(0x7f00000003c0)=""/175) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x0, 0x0) read(r2, 0x0, 0x0) r3 = socket$isdn_base(0x22, 0x3, 0x0) recvmsg(r3, &(0x7f0000000100)={&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/222, 0xde}, {&(0x7f0000000080)=""/34, 0x22}], 0x2}, 0x2000) 10:13:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp\x00') ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/15) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000000)=""/109, 0x6d}], 0x1, 0x46) 10:13:57 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x7, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 10:13:57 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000001000)='/dev/admmidi#\x00', 0xffff, 0x82000) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000001080)=0xe0, 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x2) pwritev(r1, &(0x7f0000001040), 0x0, 0x0) [ 165.560304][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 165.566308][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:13:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) ftruncate(r0, 0x4000400000000000) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0xa5, 0x4) alarm(0x4) r1 = creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) epoll_create(0x1) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x406000, 0x0) dup2(r1, r0) time(&(0x7f0000000080)) 10:13:57 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x80140912, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0xffffffffffff6418) 10:13:57 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00`\x00', 0xfffffffffffffffe}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000380)=""/4096, &(0x7f0000000040)=0x1000) ioctl$sock_proto_private(r0, 0x89e3, &(0x7f00000016c0)="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") r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000001380)=""/166, &(0x7f00000002c0)=0xa6) sendmsg$kcm(r1, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001600)="b2955cb6157f2eef45db3e7cfff244b407239c3e2a4cc20d60ca4b8a8e4aa622fd884eb4f0c9bb92a4819433ece3a9620270335699ef498693fa6004cea619e367b4b320b914f61dee6d786d8d1491b68ce7199295c5fbeac122602133cba7793d7024724512f4421f48adaeceb27dc7bc4d336ad911f879e5a8fb9960111ca68b16", 0x82}, {&(0x7f0000000300)}, {&(0x7f0000001500)="b4f8e54a1db4ae929a32635ab732096cbca5735ca2e8847e5d1b94de26aceaecf11965b81cede70ad2dff860410fcc27327aef08a5431fbfa7d05daace5f27aa5c2f0688198535fb150187105f10817d74cf29f7190632d58b696ef74cc4bf8bdb534f2b0ea0117d0772e4aba1bedef33ef6bbccd758b8", 0x77}], 0x3}, 0x20004800) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001440)=ANY=[@ANYRES32=0x0, @ANYBLOB="7a000000645330845e2e6f46a2f89f869cf059e7f3fbfcbd6c8d797cfbee1f81e39c5bc600fe3e907762c5e6b9fbd959cc9f5179999a14c4660e2413add3a9ec2dae3dcdb44cd7bcce00b714dace26a1754e554d712cfb8eaed10ad441d31e10a9e09e4382bf2a73d7d5347cc258687ea606dee1bc12eaf65e764ec09263844c670ef9d2631a"], &(0x7f00000000c0)=0x82) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={r2, 0x38, &(0x7f0000000200)=[@in6={0xa, 0x4e20, 0x5, @mcast2, 0x4}, @in6={0xa, 0x4e24, 0x1, @mcast1, 0x1}]}, &(0x7f0000000280)=0x10) 10:13:57 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) socket$unix(0x1, 0x7, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) [ 165.824097][ T8193] device ifb0 entered promiscuous mode 10:13:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r0, 0x227e, 0x715000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 10:13:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1555533c, 0x0, 0x0, 0xfffffffffffffe36) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x5, 0x5, 0x400, 0x0, 0x0, 0x0, 0x4cb]}) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0x0, 0x8}, 0x20) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7d9288a911993f0265df5cf1c62940b86bc01abc8464d4f8a906151", 0x1c) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:13:58 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:13:58 executing program 4: r0 = socket$packet(0x11, 0x400000000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x2, 0x0, 0xfffff010}, {0x80000007}]}, 0x2b) 10:13:58 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x80140912, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0xffffffffffff6418) 10:13:58 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00`\x00', 0xfffffffffffffffe}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000380)=""/4096, &(0x7f0000000040)=0x1000) ioctl$sock_proto_private(r0, 0x89e3, &(0x7f00000016c0)="a99ef342d6be69c25d2d00ca5392358ce917bbf29ddf54072bd7396dcf5350351d444b814e446a12ef72f4b0456fc0909810e242ff37e28b5d51632262fca7e337f919c5e510a185be75e7dadb288049674e1ee4c3936dbacb0ea2f2f42ffae684355a755875d50e520a83809af68d3e489bd92df0d5a911f58a1f9872a46b8bcd71c1fa8845520bf12e5d397aa112dc01e0d45cf93dcefac5a4986f585f5412f7da1682fda7908648b81a64f6ac6449d0b999f43a9adc6c79ac148a1c53ba8cd6e72ae35360d65336b22adb56360186cfd2c24156f3a8b404e05fab41155d6ea02a1fd60e948d46175be92ff695981c5442ff881e5024bfc7231fe503214702e8e4baf8a622cdffdf9715194794") r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000001380)=""/166, &(0x7f00000002c0)=0xa6) sendmsg$kcm(r1, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001600)="b2955cb6157f2eef45db3e7cfff244b407239c3e2a4cc20d60ca4b8a8e4aa622fd884eb4f0c9bb92a4819433ece3a9620270335699ef498693fa6004cea619e367b4b320b914f61dee6d786d8d1491b68ce7199295c5fbeac122602133cba7793d7024724512f4421f48adaeceb27dc7bc4d336ad911f879e5a8fb9960111ca68b16", 0x82}, {&(0x7f0000000300)}, {&(0x7f0000001500)="b4f8e54a1db4ae929a32635ab732096cbca5735ca2e8847e5d1b94de26aceaecf11965b81cede70ad2dff860410fcc27327aef08a5431fbfa7d05daace5f27aa5c2f0688198535fb150187105f10817d74cf29f7190632d58b696ef74cc4bf8bdb534f2b0ea0117d0772e4aba1bedef33ef6bbccd758b8", 0x77}], 0x3}, 0x20004800) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001440)=ANY=[@ANYRES32=0x0, @ANYBLOB="7a000000645330845e2e6f46a2f89f869cf059e7f3fbfcbd6c8d797cfbee1f81e39c5bc600fe3e907762c5e6b9fbd959cc9f5179999a14c4660e2413add3a9ec2dae3dcdb44cd7bcce00b714dace26a1754e554d712cfb8eaed10ad441d31e10a9e09e4382bf2a73d7d5347cc258687ea606dee1bc12eaf65e764ec09263844c670ef9d2631a"], &(0x7f00000000c0)=0x82) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={r2, 0x38, &(0x7f0000000200)=[@in6={0xa, 0x4e20, 0x5, @mcast2, 0x4}, @in6={0xa, 0x4e24, 0x1, @mcast1, 0x1}]}, &(0x7f0000000280)=0x10) 10:13:58 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x80140912, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0xffffffffffff6418) 10:13:58 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:13:58 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0xfd4, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, 0x0, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 10:13:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) 10:13:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x400) r1 = socket(0x15, 0x80005, 0x0) recvmmsg(r1, &(0x7f0000009240)=[{{&(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/167, 0xa7}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/43, 0x2b}], 0x3, &(0x7f0000001400)=""/147, 0x93}, 0x8}, {{&(0x7f00000014c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001540)=""/39, 0x27}], 0x1, &(0x7f00000015c0)=""/88, 0x58}, 0x1}, {{&(0x7f0000001640)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001ac0)=[{&(0x7f00000016c0)=""/102, 0x66}, {&(0x7f0000001740)=""/108, 0x6c}, {&(0x7f00000017c0)=""/195, 0xc3}, {&(0x7f00000018c0)=""/145, 0x91}, {&(0x7f0000001980)=""/213, 0xd5}, {&(0x7f0000001a80)=""/15, 0xf}], 0x6, &(0x7f0000001b40)=""/182, 0xb6}, 0x4}, {{&(0x7f0000001c00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000004040)=[{&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/138, 0x8a}, {&(0x7f0000001e40)=""/175, 0xaf}, {&(0x7f0000001f00)=""/34, 0x22}, {&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000002f40)=""/164, 0xa4}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000004000)=""/62, 0x3e}], 0x8}, 0x1000}, {{&(0x7f00000040c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000045c0)=[{&(0x7f0000004140)=""/18, 0x12}, {&(0x7f0000004180)=""/4, 0x4}, {&(0x7f00000041c0)=""/229, 0xe5}, {&(0x7f00000042c0)=""/241, 0xf1}, {&(0x7f00000043c0)=""/192, 0xc0}, {&(0x7f0000004480)=""/154, 0x9a}, {&(0x7f0000004540)=""/102, 0x66}], 0x7, &(0x7f0000004640)=""/219, 0xdb}, 0x9}, {{&(0x7f0000004740)=@caif=@dbg, 0x80, &(0x7f0000006cc0)=[{&(0x7f00000047c0)=""/255, 0xff}, {&(0x7f00000048c0)=""/50, 0x32}, {&(0x7f0000004900)=""/4096, 0x1000}, {&(0x7f0000005900)=""/154, 0x9a}, {&(0x7f00000059c0)=""/115, 0x73}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/232, 0xe8}, {&(0x7f0000006b40)=""/20, 0x14}, {&(0x7f0000006b80)=""/221, 0xdd}, {&(0x7f0000006c80)=""/13, 0xd}], 0xa, &(0x7f0000006d80)=""/64, 0x40}, 0x8}, {{&(0x7f0000006dc0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000081c0)=[{&(0x7f0000006e40)=""/165, 0xa5}, {&(0x7f0000006f00)=""/245, 0xf5}, {&(0x7f0000007000)=""/202, 0xca}, {&(0x7f0000007100)=""/147, 0x93}, {&(0x7f00000071c0)=""/4096, 0x1000}], 0x5, &(0x7f0000008240)=""/4096, 0x1000}, 0x800}], 0x7, 0x10000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000009400)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000009500)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000009540)={{{@in6=@local, @in6=@loopback, 0x4e24, 0x172, 0x4e24, 0x0, 0x0, 0xa0, 0x80, 0x16, r2, r3}, {0x4, 0x3, 0xa60a, 0xa2e, 0x8, 0x8, 0x9, 0x1}, {0x7, 0x80000001, 0x3ff, 0x5}, 0x7f, 0x6e6bbb, 0x1, 0x0, 0x3, 0x3}, {{@in6=@rand_addr="7b81c883442e2ba5c04ae23dadafd65e", 0x4d4, 0x6c}, 0x2, @in6=@rand_addr="d84f9484040f08b8cf6d3aa4fc3e7f8d", 0x3500, 0x1, 0x3, 0x9, 0x87, 0xed, 0x8}}, 0xe8) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x4) 10:13:58 executing program 5: connect(0xffffffffffffffff, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:13:58 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x80140912, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0xffffffffffff6418) [ 166.429992][ T26] audit: type=1400 audit(1556705638.274:46): avc: denied { map } for pid=8233 comm="syz-executor.3" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=30095 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 10:13:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000000a0a0508ff008dfffdffff2e0a1000000c000100ffff00007d0a00010c000200000022ff02f10000"], 0x2c}}, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) accept4$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x800) sendmsg$nl_netfilter(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x60004000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x10c, 0xe, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x3}, [@nested={0xf8, 0x7f, [@generic="4cd61958824d8400782f6d84d435252fba01084dc8812883a61d7526c24cc31628ab427d6185dd60da8a9bc945014e80a38d5231efa6f7f1c0e0c63c718983516817f40a1ead7d0f982718e1b911cdecadd620c88dfd368e46f613189bf7640a4d57a19568c38b6ebefe539ce2148a3a197915d6ecc37a73eafae6640586b47d5148da82cf46d68c217c0edc463c3ef5cf5c35bbd5b7b0c6ac493e470b054e844b86d6b368b520bbcec7bdd94fd032be3ba999ed9574a9b4f952298cd2fff313b5e404870d98512118c9baedcace970738614c4296fc31ee00956eee11a843e7053fbdac65bd3b0762c176974d3a93377478374e"]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4000004}, 0x24000000) 10:13:58 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x10c00, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000100)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000180)=0x8) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25NOUID(r3, 0x89e8, 0x0) 10:13:58 executing program 2: add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xffff, 0x4000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000180)={0xd88, 0x400, 0x201, 0x1, 0x8, 0x101, 0x20, 0xcef, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x9, 0x839d7d4, 0xf7, 0x1, 0x0, 0x36, 0x4, 0x84, 0x9fed, 0x9, 0x101, 0x8000, 0x80000001, 0x7, 0x8001]}, &(0x7f0000000380)=0x100) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8916, &(0x7f0000000200)="869d0976e14c45a8545f5e33da951d8c1d8a9c66ac4cf308a7fedfc17b7751329c2241393392540000000000000000") ioctl(r2, 0x890c, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x1e, 0x200, 0x0, 0x0, 0x5, 0x0, 0x4, 0x81, 0x8, 0x0, 0x3f, 0x7fff, 0x7, 0x4, 0x100000001, 0x4, 0x7fff, 0x3, 0x0, 0x4, 0x1, 0x4, 0xc5, 0x5, 0x0, 0xffffffff, 0x3, 0x6, 0x6, 0xffffffffffffff41, 0x0, 0x8000, 0x3f, 0xf26, 0xa27, 0x0, 0x71ea, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x7, 0x5, 0x0, 0x7fff, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'bridge_slave_1\x00'}, 0x18) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) tee(r3, 0xffffffffffffffff, 0x4, 0x0) keyctl$update(0x2, r4, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82afa4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f23f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21700000000", 0xb7) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x8000000048083, 0x0) ioctl$BLKRRPART(r5, 0x125f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 10:13:58 executing program 5: connect(0xffffffffffffffff, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:13:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x9, 0x24100) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0xffffffffffffff00, 0x0, [], &(0x7f0000000140)={0x990a73, 0x2, [], @p_u16=&(0x7f0000000100)}}) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x2c0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x26, &(0x7f00000002c0)=0xda9, 0xfffffffffffffd59) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0xfffffffffffffffd, 0x80000000, 0x7fff, 0x1f, 0x39af}) r2 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x0, &(0x7f0000000440), 0x0, 0x0, [0x9c00, 0x2ca13d]}}, 0xfef5) 10:13:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) 10:13:58 executing program 5: connect(0xffffffffffffffff, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:13:58 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r0, 0x28, 0x0, 0x0, &(0x7f0000000100)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x38440, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) [ 166.772053][ T26] audit: type=1400 audit(1556705638.624:47): avc: denied { create } for pid=8262 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 10:13:58 executing program 4: syz_execute_func(&(0x7f00000000c0)="0c09c4817a2df998cd801b69e4f56962f5696200d9d9d0c441395bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d822a2ada7676c5f2168f4808eebce00000802000c4c3dd6d68074851518fe9509b9b9bfc0000c1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f5e5bf447000026400f0d18c401fe5ff6e3df4336660fd2938c0000000f01c36666450f17720d501d54111d00") r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000180)={0x0, @reserved}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x88000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 10:13:58 executing program 1: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x1, 0xd8, "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", 0x85, 0x7, 0x1, 0x400, 0x7fffffff, 0x7f, 0x7}, r1}}, 0x120) [ 166.875366][ T26] audit: type=1400 audit(1556705638.654:48): avc: denied { write } for pid=8262 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 10:13:58 executing program 5: r0 = socket$unix(0x1, 0x0, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:13:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x9, 0x24100) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0xffffffffffffff00, 0x0, [], &(0x7f0000000140)={0x990a73, 0x2, [], @p_u16=&(0x7f0000000100)}}) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x2c0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x26, &(0x7f00000002c0)=0xda9, 0xfffffffffffffd59) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0xfffffffffffffffd, 0x80000000, 0x7fff, 0x1f, 0x39af}) r2 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x0, &(0x7f0000000440), 0x0, 0x0, [0x9c00, 0x2ca13d]}}, 0xfef5) 10:13:58 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) sendmmsg$nfc_llcp(r0, &(0x7f0000000340)=[{&(0x7f0000000140)={0x27, 0x1, 0x2, 0x0, 0x5, 0x3, "48af45094b350db71806c3dea505f4d05d824c236f2d06efa219eb6ace3d727ed0583a33e70db67743948a1dec35f63b797e869118d5f4ce9f60c668d29049", 0x2c}, 0x60, &(0x7f0000002700)=[{&(0x7f00000001c0)="9ec82116b11d6eee20d989", 0xb}, {&(0x7f00000003c0)="e77f8f7b3fbc765c7adfe610d887b9e31292ea9cf539221b3d8868ed8454d097721aa59c49fa95ca002f084f7292df35c0b40c61c7190b96b22c56ee17a4e8a49a8e7e01fe104f138f7e9749fb78c1bccabb271fd4337dfe71b2af00a27cf3002adbe48bf9040f2951c4bd2b0fb120269739d7f3f11a7d5e2799be2d94f5547f2d6941e8527c888a8b8b97661da8471297f157c2c39a2b30bc9e5e340a36ef54554c2f55", 0xa4}, {&(0x7f0000000200)="d0b9d8e59124f8c2da4437356138aee34d4ea5ed515fda234c43a0d9035e377f034fc0c3c58d0a1854", 0x29}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="aed767b591513894936328eed2f1b6b5f35c6db808015fa63f6653cfba0e7ace184f4028eaca97e0f27808c430fc4a386762dfec3d10239387a73bc89d80cd8d046f5ca68b53e52a62552aa7a0106e5ae9067c34bb2a26cc028581958ac1e7870db374fe771a1ee1cd12b4c76f9aaede25da6d460f91901b40b653a5fedcf15e7e9ac2d51ff5572deb2d09cf7b81577278e08a005c7025f90d5fbacdb50f2621547c25ae4b1e6da0bbb859e5f9f3250ab7ab1bf25d7d95af4bb60a3caac8f99a4c31a8c51eca67ec6f6ec934a64e5194aaea2107a9523513465425edbbe31e251f3911c8b945e9b11bcc7675", 0xec}, {&(0x7f0000000280)="928b21a7f4ba4c0ea7b287", 0xb}, {&(0x7f0000001580)="26ed80280eb8c24af89c062c113a9fd45eb9d08a670648636e02668a37cbd02bc209dda9cf7c04bc54143c73ccd772efe2cdfd797f554ce05702b79257bc9730694004bb886731c389ae9c4f6f5d9b1585e78281f330ab212b8ba2e5111a8f954519a030aa3b697dd32fbff28f6b94f3bfc2226339b5117e894275d68f3da846cfa8fc8239b621c22605bd88809aa7f5892d72e98a3709da36e463f5be6810244754", 0xa2}, {&(0x7f0000001640)="8762348ab6bd9f4565a50db3e118e8270a7ca1dd77d593a048e6f36c78896b429730964a7d40cd8b6031c3856ffa2d8a7baaab637b4648b4ead2acf119fb2681f7d9e18ea0c5d3838c664fee7e56127269dfd7048596bf945986efd6e6a72150b9c57ddc982c6612784bb42eeb4056953f088325ed7191e675f6d5c333de06bc2faecf36e90fe807f1a248920c67351071bcc8d9574b01", 0x97}, {&(0x7f0000001700)="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", 0x1000}, {&(0x7f00000002c0)="e4e924", 0x3}], 0xa, &(0x7f00000027c0)={0x88, 0x114, 0xb9, "b32434f1a82900710fe6cb950584d84f70bda0781feb2dcf4a1391ddf96f5361a3080a82a9fe62efc195d1f8193800ddbad4b0739c5e5e75d2160c7d9a167607fb0e919ff07d931609c531da03c966d3f41aeb90f664882cdad448584d53995cff3b06f176b8967ef73e56ba9f9ceaea2eb4a4d721cca9af"}, 0x88, 0x4000040}], 0x1, 0x800) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000040)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000240)='./file0//ile0\x00') mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0) 10:13:58 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x24802, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000040)) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, 0x0, 0x0) 10:13:58 executing program 5: r0 = socket$unix(0x1, 0x0, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:13:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5413, 0x715000) r1 = add_key(&(0x7f0000000680)='rxrpc_s\x00', &(0x7f00000006c0)={'syz', 0x0}, &(0x7f0000000700)="430360805c1daaae9e8c543c", 0xc, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="a7ee60c9ff407ebd628c07c7e959c400f541c98a7146ba7c945f5111f0b659881a6c273b00fea58199ad43eb73dd89f83cd00acc930d82b21f8378bbc9309469a48913ad5cb96e51e9eeeb72acbde5e01862358b0f04ba6bab46cbc781d7f9612dc8ecf7b51b17085c0ca641a21fc5c42b0783f2f35da9a7c728022a5ba61d09845162f76436a03913cdb5fe705dbc73f9f760daef08f7c21d9bf27937ca", 0x9e}, {&(0x7f0000000500)="fbe48ee2f7b1ea6dd118711ce0223304b68cc2fa2888cca6e90510873fd6080fa6184e6b4d00f157b9f56de78b5117f1483d9d8a349d28b9fc927c7ddec73a2d6a", 0x41}, {&(0x7f0000000580)="7ce9b03fecbfbe74529899a7a844b3a2ebc834d543ed669bbfeb5c82de6aac4bac92719b5771c322f0ce3742127aabc02399eec90331ced029a49a466b6f5a04b15581bf619c24aa8b4ffc1f2bb043fa53d18771f274c203837ecabc5566e40084065029fe230e68542324f16fe55af9a6ff94704c3e09cd3974716bda7893deca85c044df565013b1fce548f71d86f35f1a1358435c0625a0969f", 0x9b}], 0x3, r1) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) fchmodat(r2, &(0x7f0000000080)='./file0\x00', 0x104) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_tcp(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c76657273696f6e3d3970323030302e4c2c63616368653d6d6d61702c7375626a5f726f6c653d2c6f626a5f747970653d76626f786e6574302c7375626a5f747970653d2f6465762f6173686d656d002c7375626a5f747970653d6264657676626f786e6574302c0898a34614332b6066736d616769633d3078303030303030303030303030303030322c646566636f6e746578743d73797361646d5f752c61756469742c6d61736b3d5e4d41"]) fcntl$notify(r3, 0x402, 0x3) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x4) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000000)='gretap0\x00') setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000100)=0x100, 0x4) fcntl$getflags(r4, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x8012, r4, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000380)=0x0) wait4(r6, 0x0, 0x1, &(0x7f0000000740)) [ 167.076975][ T26] audit: type=1400 audit(1556705638.664:49): avc: denied { accept } for pid=8262 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 10:13:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) 10:13:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x8) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f00000000c0)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000100)=0x401, &(0x7f0000000140)=0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth1_to_team\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x3e8, 0x0, 0x240) 10:13:59 executing program 5: r0 = socket$unix(0x1, 0x0, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:13:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r0, 0x0, 0x1f, &(0x7f0000000000)='vmnet0wlan0},posix_acl_access\'\x00'}, 0x30) r2 = fcntl$getown(r1, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r1, r3, 0x0, 0x80000003) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000040)) ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f00000000c0)) [ 167.311892][ T26] audit: type=1400 audit(1556705639.164:50): avc: denied { map } for pid=8302 comm="syz-executor.4" path="/dev/ashmem" dev="devtmpfs" ino=18439 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 10:13:59 executing program 2: r0 = memfd_create(&(0x7f00000005c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) fcntl$addseals(r0, 0x40a, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x60400, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x7) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000040)=0xc) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@local, @in=@dev={0xac, 0x14, 0x14, 0xf}, 0x4e22, 0x3, 0x4e24, 0x9, 0xa, 0xa0, 0x20, 0x0, r2, r4}, {0x2, 0x4000000000000000, 0x4, 0xa724, 0x8, 0x6, 0x0, 0x6}, {0x49, 0x6, 0x2, 0x9}, 0x800, 0x6e6bb5, 0x3, 0x1, 0x2}, {{@in=@multicast1, 0x4d3, 0x33}, 0x0, @in6=@mcast1, 0x3507, 0x0, 0x1, 0x4, 0x1ff, 0xff, 0x9}}, 0xe8) 10:13:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x8) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f00000000c0)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000100)=0x401, &(0x7f0000000140)=0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth1_to_team\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x3e8, 0x0, 0x240) 10:13:59 executing program 5: socket$unix(0x1, 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:13:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5413, 0x715000) r1 = add_key(&(0x7f0000000680)='rxrpc_s\x00', &(0x7f00000006c0)={'syz', 0x0}, &(0x7f0000000700)="430360805c1daaae9e8c543c", 0xc, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="a7ee60c9ff407ebd628c07c7e959c400f541c98a7146ba7c945f5111f0b659881a6c273b00fea58199ad43eb73dd89f83cd00acc930d82b21f8378bbc9309469a48913ad5cb96e51e9eeeb72acbde5e01862358b0f04ba6bab46cbc781d7f9612dc8ecf7b51b17085c0ca641a21fc5c42b0783f2f35da9a7c728022a5ba61d09845162f76436a03913cdb5fe705dbc73f9f760daef08f7c21d9bf27937ca", 0x9e}, {&(0x7f0000000500)="fbe48ee2f7b1ea6dd118711ce0223304b68cc2fa2888cca6e90510873fd6080fa6184e6b4d00f157b9f56de78b5117f1483d9d8a349d28b9fc927c7ddec73a2d6a", 0x41}, {&(0x7f0000000580)="7ce9b03fecbfbe74529899a7a844b3a2ebc834d543ed669bbfeb5c82de6aac4bac92719b5771c322f0ce3742127aabc02399eec90331ced029a49a466b6f5a04b15581bf619c24aa8b4ffc1f2bb043fa53d18771f274c203837ecabc5566e40084065029fe230e68542324f16fe55af9a6ff94704c3e09cd3974716bda7893deca85c044df565013b1fce548f71d86f35f1a1358435c0625a0969f", 0x9b}], 0x3, r1) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) fchmodat(r2, &(0x7f0000000080)='./file0\x00', 0x104) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_tcp(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c76657273696f6e3d3970323030302e4c2c63616368653d6d6d61702c7375626a5f726f6c653d2c6f626a5f747970653d76626f786e6574302c7375626a5f747970653d2f6465762f6173686d656d002c7375626a5f747970653d6264657676626f786e6574302c0898a34614332b6066736d616769633d3078303030303030303030303030303030322c646566636f6e746578743d73797361646d5f752c61756469742c6d61736b3d5e4d41"]) fcntl$notify(r3, 0x402, 0x3) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x4) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000000)='gretap0\x00') setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000100)=0x100, 0x4) fcntl$getflags(r4, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x8012, r4, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000380)=0x0) wait4(r6, 0x0, 0x1, &(0x7f0000000740)) 10:13:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x400000, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x7, 0x0, 0x0, 0x0, 0x320]}, 0x3c) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x8180, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0x5, 0x3, 0x5, 0x1, 0xfffffffffffff801}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400428}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xc8, r1, 0xe02, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffffffff81d0}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10000}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9791}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x800}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2a57}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) 10:13:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mq_unlink(&(0x7f0000000000)='ppp1mime_typeppp0') getsockopt$inet_tcp_int(r0, 0x6, 0xa, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x9fab, 0x200000) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x8, 0x180) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f00000000c0)=0x400, 0x8) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000140)="5ee7", 0x2) 10:13:59 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) getsockopt$sock_int(r0, 0x1, 0x32, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x6c00) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x50003, 0x0) ioctl$CAPI_NCCI_GETUNIT(r1, 0x80044327, &(0x7f0000000040)=0x2) 10:13:59 executing program 5: socket$unix(0x1, 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:13:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0xfa, 0x8, 0x7ff, 'queue1\x00', 0x1}) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000040)) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f00000001c0)={0x95, 0x5, 0x200}) 10:13:59 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) getsockopt$sock_int(r0, 0x1, 0x32, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x6c00) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x50003, 0x0) ioctl$CAPI_NCCI_GETUNIT(r1, 0x80044327, &(0x7f0000000040)=0x2) 10:13:59 executing program 5: socket$unix(0x1, 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:13:59 executing program 3: r0 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="902502789c731c7c2cef75ae64b6a08b38c5da6ed1731e3179f1c6082c956849b4fe31464c1b755fa114962d37f411dc93c2ca2b2115abfe93da54923cd3", 0x3e, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r0, 0x3ff) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r2, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000040)) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000140)={0x9, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000280)={r3, &(0x7f0000000180)=""/254}) 10:13:59 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x101200) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000200)={0xfa01, 0x0, 0x30}) 10:13:59 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, 0x0, 0x0) 10:13:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000001040)='net/tcp6\x00') ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000000)=0x6) readv(r1, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/66, 0x42}, {&(0x7f0000000100)=""/126, 0x7e}], 0x2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) 10:13:59 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) unlinkat(r1, &(0x7f0000000200)='./file0/../file0\x00', 0x200) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) gettid() ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) 10:14:00 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) unlinkat(r1, &(0x7f0000000200)='./file0/../file0\x00', 0x200) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) gettid() ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) 10:14:00 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) getsockopt(r0, 0x34c, 0x0, &(0x7f0000000040)=""/48, &(0x7f0000000080)=0x30) 10:14:00 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x101200) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000200)={0xfa01, 0x0, 0x30}) 10:14:00 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, 0x0, 0x0) 10:14:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f00000003c0)="62cc4895769941610ba150f880b029de5fe1", 0x0}, 0x18) finit_module(0xffffffffffffffff, &(0x7f0000000240)='memory.events\x00', 0x3) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140)=0xe74a, 0x4) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000003780)='memory.events\x00', 0x7a05, 0x1700) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000037c0)=ANY=[@ANYBLOB]) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x5}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x6f1f, 0x8001}) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) recvmmsg(r2, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000400)=""/122, 0x7a}, {&(0x7f0000000540)=""/148, 0x94}, {&(0x7f0000000600)=""/242, 0xf2}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f0000000700)=""/243, 0xf3}, {&(0x7f0000000980)=""/103, 0x67}], 0x7, &(0x7f0000000b80)=""/120, 0x78}, 0x5}, {{&(0x7f0000000c00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000c80)=""/72, 0x48}, {&(0x7f0000000d00)=""/181, 0xb5}, {&(0x7f0000000300)=""/10, 0xa}, {0x0}, {&(0x7f0000000fc0)=""/119, 0x77}, {0x0}], 0x6}, 0xdd4}, {{&(0x7f0000001300)=@ax25={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @null, @bcast, @null]}, 0x80, &(0x7f0000001580)=[{0x0}, {&(0x7f0000001480)=""/98, 0x62}, {&(0x7f0000001500)=""/90, 0x5a}], 0x3, &(0x7f00000015c0)=""/186, 0xba}}, {{0x0, 0x0, &(0x7f00000017c0)=[{0x0}], 0x1, &(0x7f0000001800)=""/40, 0x28}, 0x7ff}, {{&(0x7f0000001840)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b80)=[{&(0x7f00000018c0)=""/134, 0x86}, {&(0x7f0000001980)=""/177, 0xb1}, {&(0x7f0000001a40)=""/195, 0xc3}, {&(0x7f0000001b40)=""/13, 0xd}], 0x4, &(0x7f0000001bc0)=""/128, 0x80}, 0xfffffffffffffffa}, {{&(0x7f0000001c40)=@hci, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001cc0)=""/116, 0x74}], 0x1, &(0x7f0000001d80)=""/38, 0x26}}, {{&(0x7f0000001dc0)=@alg, 0x80, &(0x7f0000003200)=[{&(0x7f0000001e40)=""/41, 0x29}, {&(0x7f0000001f80)=""/50, 0x32}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/61, 0x3d}, {0x0}, {&(0x7f0000003100)=""/242, 0xf2}], 0x6, &(0x7f0000003280)=""/242, 0xf2}, 0x6}, {{0x0, 0x0, &(0x7f0000003440)=[{&(0x7f0000003380)=""/141, 0x8d}], 0x1, &(0x7f0000003480)=""/102, 0x66}, 0x8}], 0x8, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000340), &(0x7f0000000380)=0x4) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000100)) finit_module(r0, &(0x7f0000003840)='memory.events\x00', 0x1) 10:14:00 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) unlinkat(r1, &(0x7f0000000200)='./file0/../file0\x00', 0x200) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) gettid() ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) 10:14:00 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) getsockopt(r0, 0x34c, 0x0, &(0x7f0000000040)=""/48, &(0x7f0000000080)=0x30) 10:14:00 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x101200) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000200)={0xfa01, 0x0, 0x30}) 10:14:00 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, 0x0, 0x0) 10:14:00 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x101200) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000200)={0xfa01, 0x0, 0x30}) 10:14:00 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x0, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @broadcast, [], {@canfd={0xd, {{0x1, 0x5, 0x100000000, 0x6}, 0x21, 0x1, 0x0, 0x0, "9cc3b1e02751254c980b6e64021c9fde336a1bd0dfe7e9bd837738b7c5af5bfcef1627019ae5555ceedf20f689a1c00eb16bc752809ab47cde2b1aa5346eae82"}}}}, 0x0) 10:14:00 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup2(r1, r0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000000)) 10:14:00 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) getsockopt(r0, 0x34c, 0x0, &(0x7f0000000040)=""/48, &(0x7f0000000080)=0x30) 10:14:00 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x101200) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) 10:14:00 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) getsockopt(r0, 0x34c, 0x0, &(0x7f0000000040)=""/48, &(0x7f0000000080)=0x30) 10:14:00 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000080)=""/177, &(0x7f0000000000)=0xb1) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x141000, 0x0) io_setup(0x4, &(0x7f00000001c0)=0x0) io_submit(r2, 0x2, &(0x7f00000003c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x1, r1, &(0x7f0000000200)="aeafa5e26aa5cc4402340f01247730f601d594c92feba1f19d7e58af58e9744f0e40e0d6fb32aa8690bdee66e029a3cee9c731a283df793d608cb2275925c750c956145251b49411c5462f195e639b0a12d3bc2447b8382453c224b4a72c132f14f0579079373750e75f72e293357c403156b0946d", 0x75, 0x43e, 0x0, 0x2, r1}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xe, 0xd953, r1, &(0x7f00000002c0)="ad263471533aaf06412a131f096ba05ca4e294cc8ab829aff12a11e77cd385c7c4539935d56b1028ec039c7037a08d91927006bcbb0fbc98abcda83f249b71f9760c9bb223b7fc8e386a340d540c3d741ef640d12396d147428774578bd1b9c33aeb128259d0cf5d0a43c31bb705f2ca96eef307f1753db434cb5efce256dca9ce5d28da6ed8ba922e82a346b006bf75c2291105a189ca13", 0x98, 0x1, 0x0, 0x1, r1}]) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000180)={0x282, "6fc2a4c821092712fc331c42eb28a87fe590da6fe8322239f887b30501e782f1"}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000140)=0x1000) 10:14:00 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x0, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xffff, 0x80400) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a5) sendfile(r1, r2, 0x0, 0x10000) 10:14:01 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:01 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x0, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:01 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x101200) 10:14:01 executing program 2: r0 = socket(0x40000000010, 0x2, 0xc) r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) chdir(&(0x7f0000000380)='./file0\x00') ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) chmod(&(0x7f0000000080)='./file1/file0\x00', 0x6) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000280)="1f0000000104fffff13b54c007110009f30501000b00024000002000030060", 0x1f) [ 169.210290][ T26] audit: type=1800 audit(1556705641.054:51): pid=8447 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=10 res=0 [ 169.254402][ T26] audit: type=1804 audit(1556705641.064:52): pid=8447 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir769404022/syzkaller.rc6Djg/27/file0/file0" dev="loop0" ino=10 res=1 10:14:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x6, &(0x7f0000000000)=@raw=[@alu={0x7, 0x8, 0xa, 0x0, 0x0, 0x8, 0xfffffffffffffff0}, @map={0x18, 0x4}, @generic={0x3, 0x1, 0x1f, 0x7, 0x10000}, @jmp={0x5, 0x20, 0xf, 0x0, 0x2, 0x0, 0x18}, @exit], &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\xeb\xff\xff(1\x18\xc7\xc1\xde\xdc(,J\\\xc4hM=\xf4\x04\xd0\xe9\'rT\x8dm\x1a?\x1a\b\x93\x82\xbf\xfe\x83\xcb4tX{$\x9f\xbfHY\x1e;\xd0\xcf\xdb&\x12G\xfd\xd7\xe71\xd8K\x9b\xc9\x04C\xf5$\xd0\x93k\x12u\x9eMM\x03\x00\x00\x00\xc8\x83\x16\x9c2)\xaa\x9fh\xa4\xd2\x0f\x98.\x06t^\xc0\xcd\x95\x81*\xece1\x9e*3\xfa\xb5=\xd2\x1e-\xd3]}\xa7\xbfDZn\xd4\x82\x19\xfb\x1bjE\xc3D\xd8\xd56G\xd9\xc3\x90\xf5\xb9\xdc\x98\xb8\x8f=\xdf\xf0,e\x1dl\xe0\xc5\x80\a\xb1\xad\xbf\xc5\x88!j\xce\x00\x00\x00\x00\x00\x00', 0x1, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = gettid() getpgid(r0) 10:14:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xffff, 0x80400) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a5) sendfile(r1, r2, 0x0, 0x10000) 10:14:01 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:01 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) [ 169.396828][ T8457] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 10:14:01 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) [ 169.532897][ T8457] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 10:14:01 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:01 executing program 2: r0 = socket(0x40000000010, 0x2, 0xc) r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) chdir(&(0x7f0000000380)='./file0\x00') ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) chmod(&(0x7f0000000080)='./file1/file0\x00', 0x6) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000280)="1f0000000104fffff13b54c007110009f30501000b00024000002000030060", 0x1f) 10:14:01 executing program 3: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x9, &(0x7f00000000c0), 0x4) [ 169.604800][ T26] audit: type=1800 audit(1556705641.454:53): pid=8475 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=11 res=0 10:14:01 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) 10:14:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x6, &(0x7f0000000000)=@raw=[@alu={0x7, 0x8, 0xa, 0x0, 0x0, 0x8, 0xfffffffffffffff0}, @map={0x18, 0x4}, @generic={0x3, 0x1, 0x1f, 0x7, 0x10000}, @jmp={0x5, 0x20, 0xf, 0x0, 0x2, 0x0, 0x18}, @exit], &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\xeb\xff\xff(1\x18\xc7\xc1\xde\xdc(,J\\\xc4hM=\xf4\x04\xd0\xe9\'rT\x8dm\x1a?\x1a\b\x93\x82\xbf\xfe\x83\xcb4tX{$\x9f\xbfHY\x1e;\xd0\xcf\xdb&\x12G\xfd\xd7\xe71\xd8K\x9b\xc9\x04C\xf5$\xd0\x93k\x12u\x9eMM\x03\x00\x00\x00\xc8\x83\x16\x9c2)\xaa\x9fh\xa4\xd2\x0f\x98.\x06t^\xc0\xcd\x95\x81*\xece1\x9e*3\xfa\xb5=\xd2\x1e-\xd3]}\xa7\xbfDZn\xd4\x82\x19\xfb\x1bjE\xc3D\xd8\xd56G\xd9\xc3\x90\xf5\xb9\xdc\x98\xb8\x8f=\xdf\xf0,e\x1dl\xe0\xc5\x80\a\xb1\xad\xbf\xc5\x88!j\xce\x00\x00\x00\x00\x00\x00', 0x1, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = gettid() getpgid(r0) 10:14:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xffff, 0x80400) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a5) sendfile(r1, r2, 0x0, 0x10000) 10:14:01 executing program 3: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:01 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f3ccb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) [ 169.800870][ T8494] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 169.811297][ T26] audit: type=1804 audit(1556705641.514:54): pid=8475 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir769404022/syzkaller.rc6Djg/28/file0/file0" dev="loop0" ino=11 res=1 10:14:01 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) 10:14:01 executing program 3: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x6, &(0x7f0000000000)=@raw=[@alu={0x7, 0x8, 0xa, 0x0, 0x0, 0x8, 0xfffffffffffffff0}, @map={0x18, 0x4}, @generic={0x3, 0x1, 0x1f, 0x7, 0x10000}, @jmp={0x5, 0x20, 0xf, 0x0, 0x2, 0x0, 0x18}, @exit], &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\xeb\xff\xff(1\x18\xc7\xc1\xde\xdc(,J\\\xc4hM=\xf4\x04\xd0\xe9\'rT\x8dm\x1a?\x1a\b\x93\x82\xbf\xfe\x83\xcb4tX{$\x9f\xbfHY\x1e;\xd0\xcf\xdb&\x12G\xfd\xd7\xe71\xd8K\x9b\xc9\x04C\xf5$\xd0\x93k\x12u\x9eMM\x03\x00\x00\x00\xc8\x83\x16\x9c2)\xaa\x9fh\xa4\xd2\x0f\x98.\x06t^\xc0\xcd\x95\x81*\xece1\x9e*3\xfa\xb5=\xd2\x1e-\xd3]}\xa7\xbfDZn\xd4\x82\x19\xfb\x1bjE\xc3D\xd8\xd56G\xd9\xc3\x90\xf5\xb9\xdc\x98\xb8\x8f=\xdf\xf0,e\x1dl\xe0\xc5\x80\a\xb1\xad\xbf\xc5\x88!j\xce\x00\x00\x00\x00\x00\x00', 0x1, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = gettid() getpgid(r0) 10:14:01 executing program 2: r0 = socket(0x40000000010, 0x2, 0xc) r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) chdir(&(0x7f0000000380)='./file0\x00') ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) chmod(&(0x7f0000000080)='./file1/file0\x00', 0x6) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000280)="1f0000000104fffff13b54c007110009f30501000b00024000002000030060", 0x1f) 10:14:01 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca6b87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:01 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) 10:14:01 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) [ 170.117854][ T26] audit: type=1800 audit(1556705641.964:55): pid=8514 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=12 res=0 10:14:02 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87076bee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x91, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000100)="600597ce2ae8f740b09b2bf6921212162e95a7729bfaf5c0d62352ccd3b462baf3f9d16845601311b386c08026fbf2a9eb27243361665db3b0eed6513f0ecc0756af8d73daa2") ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000040)={0x8554, 0x2, 0x9}) [ 170.184055][ T8526] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 170.254087][ T26] audit: type=1804 audit(1556705642.024:56): pid=8514 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir769404022/syzkaller.rc6Djg/29/file0/file0" dev="loop0" ino=12 res=1 10:14:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xffff, 0x80400) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a5) sendfile(r1, r2, 0x0, 0x10000) 10:14:02 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) 10:14:02 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:02 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f03bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:02 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x100000004, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x77359400}}, 0x0) 10:14:02 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) [ 170.495715][ T26] audit: type=1800 audit(1556705642.344:57): pid=8556 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16558 res=0 10:14:02 executing program 2: r0 = socket(0x40000000010, 0x2, 0xc) r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) chdir(&(0x7f0000000380)='./file0\x00') ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) chmod(&(0x7f0000000080)='./file1/file0\x00', 0x6) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000280)="1f0000000104fffff13b54c007110009f30501000b00024000002000030060", 0x1f) 10:14:02 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f05bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:02 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:02 executing program 1: r0 = socket(0x2000000000011, 0x5, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x3d) write$binfmt_aout(r0, &(0x7f0000000040)={{0x108, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x8}, "0506b9c0d16c05544383fd2a039bdee2c8dc77343ed2988db7f32a375ffb1866a0a8b64ada1c7539791e7887"}, 0x4c) 10:14:02 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) 10:14:02 executing program 0: syz_emit_ethernet(0x5f8, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x3ff, 0x6, '(u ', 0x5c2, 0x2b, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, {[@hopopts={0x5e, 0x21, [], [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @pad1, @generic={0xffffffffffffffff, 0x7d, "98a1a550c90fcb2db9c9d4d617f986b7ab06b02064fc4dd0da8e41970c8c94696477f5683597182350ad4c9a4310693299b746c31a743023b7063125938ca811afb14e7d92a7d045c2b49ce1162bfd42564a12fe625266c4caf19acef2cd02615d7fbc7b3b2ee420d9c877e0db7d109ad80ab6b033433994efe56b65de"}, @hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x50, {0x9, 0x12, 0x200000000, 0x3ff, [0x8, 0x3, 0x558, 0x7, 0x5, 0xe44, 0x2, 0x80000001, 0x6]}}, @calipso={0x7, 0x18, {0x100000001, 0x4, 0x685a, 0x6, [0x6f88, 0x0]}}, @padn={0x1, 0x1, [0x0]}]}, @routing={0xff, 0xe, 0x1, 0x7f, 0x0, [@loopback, @remote, @rand_addr="8934bdf6da76f38ea0ca382a786e31af", @ipv4={[], [], @rand_addr=0x1000}, @rand_addr="dfa1823066e1d5236909ddfb6d1f74a3", @rand_addr="d16901204f2b70ed9bf4b96cb664f876", @initdev={0xfe, 0x88, [], 0x0, 0x0}]}, @hopopts={0x3c, 0xf, [], [@calipso={0x7, 0x20, {0x9, 0x6, 0x9, 0x5, [0x944, 0x9, 0x7]}}, @jumbo={0xc2, 0x4, 0x477a}, @enc_lim={0x4, 0x1, 0x2}, @calipso={0x7, 0x50, {0x0, 0x12, 0x5, 0x0, [0x1f1, 0x800, 0x104, 0x4, 0x2, 0x20, 0x5, 0x400, 0x3f]}}]}, @srh={0x6c, 0x8, 0x4, 0x4, 0x8, 0x48, 0x2, [@ipv4={[], [], @broadcast}, @local, @empty, @dev={0xfe, 0x80, [], 0x1a}]}, @dstopts={0x0, 0x10, [], [@generic={0xfa71, 0x7e, "7187cd8a9e447cdce1904c91cd93cdfb59487f2cfacb2be288d50930b49ebe51d3003b236e84df0532ef3e04a0c4b7b98d5ead7e7b9e12f94c63278a6958db02f85d2d91c72cfcabc704ba524d17710b2d3676b73e1ce91d4d9f3c86288e934007cc7cdb7914b97f163f822ce056fc368f4748f428293f0eba7db1344894"}, @jumbo={0xc2, 0x4, 0x376}]}], @gre={{0x0, 0x0, 0x1, 0xdb, 0x0, 0x7, 0x0, 0x1, 0x880b, 0xe4, 0x0, [0xa61], "c0606fa8c6b729261dc77b7298fa4c65461806ad19d29e6fbd3a7e892ec289f8d15c0cb92994412f3123f16f52a8030af74233293620cf7c867973ea865aa4b485915b7fe9e94e331114619dd23464bc67effc123c93fab3fcc0234c429ebfdc648d147156aa13bdb1d32641a1896026dd6a4ca6d09436d8a3697c6c40c06ba0917c99dbd075ebc9cde8ba6146174b7002901c2fd4c359af5208cb20b342c523397e196d0b558cea5f845f1a6864c05fa682e8cf94f83e586f6478a3e4f3fd3004a766ac2fa87d1e562971431f690934966d4713a48d28b1c55f565f3b67ed3471ea6693"}, {0x2, 0x0, 0x3, 0x2, 0x0, 0x0, 0x800, [0x6360, 0x6], "b14e1e3942f1d7aa4169444eb1318c5ff541a1d384d712e7e0244454a4d110480ea3c43b969c6f5301d32c4021878a7829c987492a9a1f89733110630d383146e57f5aa82af021f777396b73168cd78d5c127da6c52b7d5f4569c1f9c007224f7f80bfbebcb149ffce6dbbfd4b0748a21987c137ed3749ad528e475c5864d00492bf2e95b5c51ad776b7"}, {0xfffffffffffffff7, 0x0, 0xe7b1, 0x3ff, 0x0, 0x0, 0x86dd, [], "5334ca8b223181cfb1813dfa69789b41f34f9d87e149dd0013bf0333e9ede7d5482d30212d4c71d9cfa500320c70e0"}, {0x8, 0x88be, 0x3, {{0x0, 0x1, 0xfff, 0x4, 0x10000, 0x3, 0x2, 0x200}}}, {0x8, 0x22eb, 0x0, {{0x2, 0x2, 0x1, 0x100000000, 0x7, 0x0, 0x7fffffff, 0x1}, 0x2, 0x8000, 0x7ff, 0x5, 0x40, 0x6, 0x785c, 0x4, 0x1000, 0xb6}}, {0x8, 0x6558, 0x3, "53bb4dbd82256c7c55a37c0ce53391ba53889697876dd78e4fb8bd08ec442b0e91407476937a60827979de767fb7ae0067dbfbd5f257ccd695975eef2b8990c450ca6b2e6bc3e712253556dfb16dc2c9acc2974330ddc8b62c34cc71a48a3c083878a680630fdd8b5d9bb1e7e645d5734d0eb3b27ad7f2c1824a7d39216d73ccdc81dec2490b72a8c3dcfe3be3e924274ee13e9a8ceaaf904c591220bbe9b35ddc182ecafa5d705a32f1b1e87400d19d378c09e714d37b55e33e0f20fb3d6c1765d521688eb28dfea92d7b73ef338c454ea62b99ba31bf756608ee86b9af60128e3b1179bd2bfb6ad69985"}}}}}}}, 0x0) [ 170.619529][ T26] audit: type=1804 audit(1556705642.354:58): pid=8556 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir769404022/syzkaller.rc6Djg/30/file0/file0" dev="sda1" ino=16558 res=1 10:14:02 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) 10:14:02 executing program 3: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:02 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646031d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:02 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) finit_module(r0, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2) r1 = socket$inet(0x2, 0x3, 0x81) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="3400242430a82fb50b47561bcc2b163d30c8c02b56e9c62ccda2903f740cc528e43bb7b066f9c314ce34600e2a5882065f62380795ad00"], 0x37}}], 0x1, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000001c0)={0x3, 0x0, [{0x2000, 0x1b, &(0x7f0000000100)=""/27}, {0x1000, 0x2, &(0x7f0000000140)=""/2}, {0x7004, 0x22, &(0x7f0000000180)=""/34}]}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) getsockopt$inet_buf(r1, 0x0, 0x27, &(0x7f0000000240)=""/186, &(0x7f0000000300)=0xba) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) [ 170.812061][ T8579] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 10:14:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000300)={0x7, 0x58, 0x7, 0x5, 0x8, [{0x2, 0x96b8, 0x2, 0x0, 0x0, 0x80}, {0xe64, 0x7, 0xffffffff, 0x0, 0x0, 0x1}, {0x200, 0x4, 0x6, 0x0, 0x0, 0xc01}, {0xfffffffffffffffa, 0x463, 0xffff, 0x0, 0x0, 0x800}, {0x2, 0xffff, 0x3, 0x0, 0x0, 0x2200}, {0x9, 0x708, 0x8, 0x0, 0x0, 0x400}, {0x2, 0x100000000, 0x9, 0x0, 0x0, 0x200}, {0x3, 0x7fffffff, 0x3, 0x0, 0x0, 0x1}]}) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f00000001c0)={0x20, 0xecfa, 0x3, 0x4}, 0x10) ioctl$sock_proto_private(r2, 0x89ea, &(0x7f0000000500)="77f5f3a25e71764d066c07d8d651ebecf6e19882a398f9b30bd778b1228ffb660cc0127ad1aed80e500c302c980996e6cd205d30575c4c9c975185ded01a8852f797dfae4b0500379fd2875fdbca32dc8102d43e74c14b6fba3ca31630097d2cd50df4734a5c4650b3d15a092f44e73375011b4206b2df706bdcd7edc6ae071b2357a0b3120470d5a397491c95087963af099d9b39c72f91964f88045d652f3f40f256dba8fe61b21da17e25f4ca1951eb54766e9e96b9d80488d272") prctl$PR_GET_SECCOMP(0x15) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x4, 0x3bb6, 0x8}}, 0x30) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)={@local, @rand_addr=0xc67, 0x1, 0x2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}]}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0xf800000000000000, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x28}}, @in={0x2, 0x4e24, @empty}}}, 0x118) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x3a, "ae6b39ce18cca271476bc1e952c027b22e2dd7efb47c5dc275a872c19657c25d3c7ff47a0eab9477bb1b0a794454a78b9818e50c2a0d4292b9c4"}, &(0x7f0000000280)=0x42) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000002c0)={0x3ff, 0x202, 0x0, 0x10001, r3}, 0x10) 10:14:02 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646051d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xffffffffffffffff) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10, 0x0) write$ppp(r1, &(0x7f0000000080)="3f35d7ab613f6bba3aa78454bb422c5294539bd4", 0x14) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r0, r0}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={'crct10dif\x00'}}) 10:14:02 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) 10:14:02 executing program 3: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:03 executing program 1: socket$pptp(0x18, 0x1, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)=0x3) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)) 10:14:03 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca03cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:03 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) 10:14:03 executing program 3: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:03 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca05cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:03 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) 10:14:03 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000300)={0x7, 0x58, 0x7, 0x5, 0x8, [{0x2, 0x96b8, 0x2, 0x0, 0x0, 0x80}, {0xe64, 0x7, 0xffffffff, 0x0, 0x0, 0x1}, {0x200, 0x4, 0x6, 0x0, 0x0, 0xc01}, {0xfffffffffffffffa, 0x463, 0xffff, 0x0, 0x0, 0x800}, {0x2, 0xffff, 0x3, 0x0, 0x0, 0x2200}, {0x9, 0x708, 0x8, 0x0, 0x0, 0x400}, {0x2, 0x100000000, 0x9, 0x0, 0x0, 0x200}, {0x3, 0x7fffffff, 0x3, 0x0, 0x0, 0x1}]}) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f00000001c0)={0x20, 0xecfa, 0x3, 0x4}, 0x10) ioctl$sock_proto_private(r2, 0x89ea, &(0x7f0000000500)="77f5f3a25e71764d066c07d8d651ebecf6e19882a398f9b30bd778b1228ffb660cc0127ad1aed80e500c302c980996e6cd205d30575c4c9c975185ded01a8852f797dfae4b0500379fd2875fdbca32dc8102d43e74c14b6fba3ca31630097d2cd50df4734a5c4650b3d15a092f44e73375011b4206b2df706bdcd7edc6ae071b2357a0b3120470d5a397491c95087963af099d9b39c72f91964f88045d652f3f40f256dba8fe61b21da17e25f4ca1951eb54766e9e96b9d80488d272") prctl$PR_GET_SECCOMP(0x15) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x4, 0x3bb6, 0x8}}, 0x30) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)={@local, @rand_addr=0xc67, 0x1, 0x2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}]}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0xf800000000000000, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x28}}, @in={0x2, 0x4e24, @empty}}}, 0x118) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x3a, "ae6b39ce18cca271476bc1e952c027b22e2dd7efb47c5dc275a872c19657c25d3c7ff47a0eab9477bb1b0a794454a78b9818e50c2a0d4292b9c4"}, &(0x7f0000000280)=0x42) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000002c0)={0x3ff, 0x202, 0x0, 0x10001, r3}, 0x10) 10:14:03 executing program 1: r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x210001, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000180)="4a6d9404dfe180629b8b22b0d2e900982508cd6601717e1ca8ff1378f431949a65ec4044ccf284635b9d7a00e83922d1", &(0x7f00000003c0)="cbefaf8104d17758ffa5022990e40722916494f643e92bede8fda543f655cdaba48192cb680b97e6bfb1cc72cf0b84a0ec221538dac3c1f34ff066c00258b161cb5b0055e237589915389082951dc5419c0175b7e0e503745e9d0dab828cb6e7dc67e5d0adf864fc7c6d52499272f953bde559965abad34650a49933e2b39e490611040649ac2fdaae0c87bea346fa95c5768782ae6ab319dd92d19c487f713d9cf0152cd005ad92e382b1593b28967cb2d522370b596a4a41ba0f891dbe3e8deac869dfa979980792210c90"}, 0x20) poll(&(0x7f0000000100)=[{r0, 0x3bb009f9a71f194b}], 0x1, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000000c0)="1e6e", 0x2, 0xfffffffffffffffe) fsync(r0) add_key$user(0x0, 0x0, &(0x7f0000000380)="d7", 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000340), 0x25c, 0xfffffffffffffffd) socket$inet6_sctp(0xa, 0x1, 0x84) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'sha3-256-generic\x00\x00\xfe\xff\xff\x00'}}) 10:14:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xffffffffffffffff) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10, 0x0) write$ppp(r1, &(0x7f0000000080)="3f35d7ab613f6bba3aa78454bb422c5294539bd4", 0x14) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r0, r0}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={'crct10dif\x00'}}) 10:14:03 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x20932074) 10:14:03 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) 10:14:03 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:03 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'ip_vti0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}}) 10:14:03 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:03 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:03 executing program 5: socket$unix(0x1, 0x2, 0x0) getrlimit(0x11189f54a43637f0, &(0x7f0000000000)) 10:14:04 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:04 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'vlan0\x00', 0x0}) connect(r0, &(0x7f0000931ff4)=@hci={0x1f, r1, 0x3}, 0xfffffffffffffcc8) 10:14:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @local}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bpq0\x00', 0x9, 0x8, 0x8}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) 10:14:04 executing program 1: 10:14:04 executing program 2: 10:14:04 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, 0x0, 0x0) 10:14:04 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:04 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:04 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, 0x0, 0x0) 10:14:04 executing program 1: 10:14:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @local}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bpq0\x00', 0x9, 0x8, 0x8}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) 10:14:04 executing program 2: 10:14:04 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:04 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101240, 0x0) write$9p(r1, &(0x7f0000000040)="fd5d9b42c0dc1c13b41c1e02aefbf18dd1892f4f13c0a757725097f6616a7c7758733b46ce613d773bcea9d3783015e0228b07db05b998a4c5fec828ac2e78a07f07551f278cedc9ff76610d43b598740b178bcfda759a297d586bde1f1affd5942178ce63bd6d4f44494d599c1207b5a3c4129bf8a9244bd6c49139fd295b6b112e05b0251bbf42ab49a8418953ac4cc76b5e076cf4f5bbc4f5a7d4c5ec1d21770e860fd233e6f7f0fb35f715b3e1f2f049df93ec5fcdc7a4b4a091e299df8af4c4d2b961cbaf910a0fe6e43ac9b92c23607fce71db0937eace70f34154d107bd83d410d14937f75b1c", 0xea) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:04 executing program 2: 10:14:04 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, 0x0, 0x0) 10:14:04 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80000, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @remote}}, 0x24) 10:14:04 executing program 1: 10:14:04 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @local}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bpq0\x00', 0x9, 0x8, 0x8}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) 10:14:04 executing program 2: 10:14:04 executing program 1: 10:14:04 executing program 2: 10:14:04 executing program 3: 10:14:04 executing program 5: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x3, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0xd1) pipe(&(0x7f0000000040)) fcntl$addseals(r0, 0x409, 0xe) 10:14:04 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @local}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bpq0\x00', 0x9, 0x8, 0x8}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) 10:14:04 executing program 3: 10:14:04 executing program 2: 10:14:04 executing program 1: 10:14:05 executing program 5: set_tid_address(&(0x7f0000000000)) r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@tipc=@name={0x1e, 0x2, 0x0, {{0x43, 0x1}, 0x2}}, 0xfffffffffffffed2) 10:14:05 executing program 3: 10:14:05 executing program 4: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:05 executing program 1: 10:14:05 executing program 2: 10:14:05 executing program 3: 10:14:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @local}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bpq0\x00', 0x9, 0x8, 0x8}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:05 executing program 2: 10:14:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:05 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x185800, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000040)={0x6859, 0x3f}) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:05 executing program 1: 10:14:05 executing program 3: 10:14:05 executing program 2: 10:14:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @local}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bpq0\x00', 0x9, 0x8, 0x8}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:05 executing program 2: 10:14:05 executing program 1: 10:14:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @local}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bpq0\x00', 0x9, 0x8, 0x8}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:05 executing program 5: connect(0xffffffffffffffff, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:05 executing program 3: 10:14:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r1, 0xffffffffffffffff) ioctl$RTC_ALM_READ(r2, 0x80247008, 0x0) r3 = socket$inet6(0xa, 0x0, 0x3ff) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r5 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r5, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x4000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x100, 0x1800000000, 0x7f}) 10:14:05 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x4000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x19c, r1, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x44a8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffc}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6e0}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x37a8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8e}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4080}, 0x840) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f0000000000)=""/107) 10:14:05 executing program 2: socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x10b000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xc00, 0x0) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000280)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x75125e4805b252fe) r1 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x1) ioctl$EVIOCGKEY(r1, 0x80404518, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x40000000) 10:14:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @local}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bpq0\x00', 0x9, 0x8, 0x8}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x4717fd, 0x280000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x2, 0x4, 0x80000005, {0x77359400}, {0x1, 0x0, 0x7, 0xfffffffffffffffe, 0x7f, 0x9, "5184370f"}, 0x7, 0x1, @fd=r1, 0x4}) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @local}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bpq0\x00', 0x9, 0x8, 0x8}) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:05 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000180)={0x7, 0x1f}) fstat(0xffffffffffffff9c, &(0x7f0000000880)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000005c0)={0x1, 0x2, 'client0\x00', 0x4, "01ee703c0b4babb8", "b811ff0c6e3b92b0f2ff316dd7514d4c7111f0e20c0b8775ccb40c648cbb7414", 0x7, 0x200}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x12d) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000700)={0x6, 0x100, 0x7f}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 10:14:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) [ 174.174733][ T8814] IPVS: ftp: loaded support on port[0] = 21 10:14:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @local}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bpq0\x00', 0x9, 0x8, 0x8}) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 174.330996][ T8837] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 174.375279][ T8837] FAT-fs (loop1): Filesystem has been set read-only 10:14:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r1, 0xffffffffffffffff) ioctl$RTC_ALM_READ(r2, 0x80247008, 0x0) r3 = socket$inet6(0xa, 0x0, 0x3ff) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r5 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r5, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x4000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x100, 0x1800000000, 0x7f}) [ 174.474818][ T8850] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 10:14:06 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) [ 174.774037][ T8865] IPVS: ftp: loaded support on port[0] = 21 10:14:06 executing program 1: socket$inet(0x2, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) poll(&(0x7f0000000000)=[{r0}], 0x1, 0xffff) r1 = memfd_create(&(0x7f0000000080)='\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xfffffdef) 10:14:06 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @local}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bpq0\x00', 0x9, 0x8, 0x8}) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:06 executing program 2: socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x10b000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xc00, 0x0) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000280)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x75125e4805b252fe) r1 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x1) ioctl$EVIOCGKEY(r1, 0x80404518, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x40000000) 10:14:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:06 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20800, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x4) 10:14:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:06 executing program 3: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) [ 175.055911][ T8881] IPVS: ftp: loaded support on port[0] = 21 10:14:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:07 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0xd6a9a4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20}}, 0xffffffffffffff16) 10:14:07 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:07 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:07 executing program 3: openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1dee870b, 0x4200) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000100)) 10:14:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:07 executing program 5: socket$unix(0x1, 0x2, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r0, 0x0, 0x1}, 0x10) connect(r0, &(0x7f0000000040)=@ipx={0x4, 0x6, 0x3, "4260906a7202", 0x1}, 0x80) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x0, 0x2, 0x8}}, 0x28) 10:14:07 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000840)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="f4d91400ec03e47f97897922921e400000007b7b90c9b358da5400c46dd5abccf008a69fa715e083d6a02749da4b60ddd49a087141f47259a728285609f59c988d96462ce3d8", @ANYRES16=r3, @ANYBLOB="010026bd7000fcdbdf250d00000020000200040004000800020002000000080001000200000008000200ff070000180002000400040008000100ffffff7f08000200000200003000020004000400040004000400040008000200090000000800020001000000040004000400040008000200000000001400020008000100fdffffff080001008100000064000100380004001400010002004e22ac1414aa0000000000000000200002000a00004000000000fe8000000000000000000000000000bbffff000008000300080000000800030000000000100001007564703a73797a32000000000800030047000000"], 0xf4}}, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.sched_load_balance\x00', 0x2, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000a00)={0x77c}) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000000)="f0b67cedf519992d8b53db4987d75ae6c41042a216d04076aeffa1b2cc9dbd8c4843e248f02eb94825ea76624957b27e9083e076c1a7fadc57f87f6d7e2d7c16", 0x40}, {&(0x7f0000000040)="8de434d604bcbde0fc9fabc803adbf3ae512aaf496b806", 0x17}, {&(0x7f0000000080)="af20b8c8a1161012266357673c6b05980b277dde07b474ef679574b6df6b8741b6a31b297a17ae440157", 0x2a}, {&(0x7f0000000200)="c7060b1910efe42eb7e94d9f7b8c374a81f71be99620eb072effc7ef387b59596b250a6f99554c1fc84d74b738723f0f939badee8f96caf52f666573c8616d6802917df5f96d9a9467213a97b29089a1d47fb5cda3c2c8ac9d275c1d8bf4bcf48044614dcba3e3e8a604ea720b6f88717290def4f43d4b165423657962f7b0671452f9", 0x83}, {&(0x7f00000002c0)="e38fbc72149809d863a307db6414752151a0c1317e265dbf7abece5e3f6eb0f20ee64c57ca1b3157ec25110e7b2e276ac1681efd002aa4519053ccb25f6f35a7b1113d063eac380c1864765804e2d047f5c109bb60", 0x55}, {&(0x7f0000000340)="bcae31161d030bc4b70e7afd97aac7c6d763b50fade00a4473e408d86d5910781a34eaf1a09d30021e876159387ff981ef7b08ef5c3b02c44b081f69caf74caafe9ee3185dbc1cd99cdaeb2d96da3a827794517621c4d7c28c421765adbb4cf856a647eac8c0977695426b4eb3be6354", 0x70}, {&(0x7f00000004c0)="30807dbf18f210d2f8473c104e03a51d006f2b7b07796937d5ec368c5d67da26f9362856f8394b315a021bb8578afed013a474222b315df2e7e62fa5840c5c65a82c4ddc9c2883914b800b46bc7e2a6cda77abcd1151162b26caa0c0759f75cfa7713914739f8528d34355ad330b3e8b4a79", 0x72}], 0x7) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) write$cgroup_int(r4, &(0x7f00000003c0), 0x12) clock_adjtime(0x0, &(0x7f00000005c0)={0x481, 0x100000000, 0xc0b, 0x2, 0x99, 0x9, 0x5, 0x7, 0x20, 0x1, 0x10000, 0x0, 0x0, 0x7d23, 0x8001, 0x1, 0x9, 0x1000, 0x3, 0x60ad1cea, 0x10001, 0x0, 0x3, 0x10001, 0x23, 0x2}) 10:14:07 executing program 5: stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000480)) r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/relabel\x00', 0x2, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000080)="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", 0xfd}, {&(0x7f0000000180)="a6c7ab79138c15b2939c3be4622b", 0xe}, {&(0x7f00000001c0)="3e0c57b84a4ca610c029f8a4edca2e0c450a1b05ae3f4ac8dfd201e068d0a9e51706c7922216b6aa9ca81ab041b88579a167a0b986d81d24bb498c24e4f00022d682a97bff46be4f37b82e16fbd146623dccff6561a5375e976f4e848cda892bc4f469850cd65a15ca34d6c8521c37b6cdaae57ed7e76933c44534e773389cfbf9a78af11a6e5e9e6ff36085c8a04438f5826c91e914e992b884e9e9770dd3233a7de0be9cdb619cd3afe522775ae8eea50c01c93d9cce51fc3fd5", 0xbb}, {&(0x7f0000000280)="c8b62c69962f640644b70480cc0765868257004d32865a5d7c630fb154bfb838060ef82dc4873f4e46bcb053f1034df7002669073950cf8b66e56a4d041f6d92f0ed17574e9afd27c4067cf20fe834b2f5f1b6c1a01307aa83e1ec8cba8f9a4e40dc1cb830f68abbb03f9c76781938b64e1fc325b4b6c2298bf9a6b855095c483319b7591a5bd3959f138654643c62e2f54fc8af9bbcaa1ad83218759a5326f16a3ca4a764f1f3b419e04ad21e00a38fde7ceb738fe1001240a78540e9edae19a78dc72f7385649c3c68f3ae69c27f205c6e4b2e9ca8154f59e1a7021524d4f61803c88929a9d8cda33ca2cbe3828e3431880ad8e3638943f4", 0xf9}, {&(0x7f0000000380)="ac46d23e93217475da53ac2b208e6e3f2f3cd9913fda559cd8b831b502d1074fb07059041d43303ee8ddcc9ea413f95cb877a112", 0x34}], 0x5) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) r3 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000540)={0x1fe, 0xdb60d30, 0x3, 0x6}, 0x10) 10:14:07 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:07 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) [ 176.093054][ T26] audit: type=1400 audit(1556705647.944:59): avc: denied { create } for pid=8934 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 10:14:08 executing program 2: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:08 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7fff, 0x80) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x7, 0x70, 0x2, 0x0, 0x401, 0xff, 0x0, 0xf4, 0x80200, 0x1, 0x2, 0x75, 0x3, 0x1, 0x5, 0x400, 0x1, 0x3, 0x0, 0x9, 0xfffffffffffffff9, 0xd49, 0x2, 0x8000, 0x2, 0x7, 0x9, 0x80000001, 0x5, 0x10001, 0xfffffffffffffad3, 0x6, 0x1, 0x1, 0x10001, 0x8, 0x10001, 0x9, 0x0, 0x5, 0x0, @perf_config_ext={0xc, 0x489}, 0x10000, 0x100000001, 0x80000000, 0x7, 0x3, 0x0, 0x3}) 10:14:08 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x29, 0x9, &(0x7f00000000c0), 0x4) [ 176.260806][ T26] audit: type=1400 audit(1556705647.944:60): avc: denied { setopt } for pid=8934 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 10:14:08 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000840)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="f4d91400ec03e47f97897922921e400000007b7b90c9b358da5400c46dd5abccf008a69fa715e083d6a02749da4b60ddd49a087141f47259a728285609f59c988d96462ce3d8", @ANYRES16=r3, @ANYBLOB="010026bd7000fcdbdf250d00000020000200040004000800020002000000080001000200000008000200ff070000180002000400040008000100ffffff7f08000200000200003000020004000400040004000400040008000200090000000800020001000000040004000400040008000200000000001400020008000100fdffffff080001008100000064000100380004001400010002004e22ac1414aa0000000000000000200002000a00004000000000fe8000000000000000000000000000bbffff000008000300080000000800030000000000100001007564703a73797a32000000000800030047000000"], 0xf4}}, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.sched_load_balance\x00', 0x2, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000a00)={0x77c}) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000000)="f0b67cedf519992d8b53db4987d75ae6c41042a216d04076aeffa1b2cc9dbd8c4843e248f02eb94825ea76624957b27e9083e076c1a7fadc57f87f6d7e2d7c16", 0x40}, {&(0x7f0000000040)="8de434d604bcbde0fc9fabc803adbf3ae512aaf496b806", 0x17}, {&(0x7f0000000080)="af20b8c8a1161012266357673c6b05980b277dde07b474ef679574b6df6b8741b6a31b297a17ae440157", 0x2a}, {&(0x7f0000000200)="c7060b1910efe42eb7e94d9f7b8c374a81f71be99620eb072effc7ef387b59596b250a6f99554c1fc84d74b738723f0f939badee8f96caf52f666573c8616d6802917df5f96d9a9467213a97b29089a1d47fb5cda3c2c8ac9d275c1d8bf4bcf48044614dcba3e3e8a604ea720b6f88717290def4f43d4b165423657962f7b0671452f9", 0x83}, {&(0x7f00000002c0)="e38fbc72149809d863a307db6414752151a0c1317e265dbf7abece5e3f6eb0f20ee64c57ca1b3157ec25110e7b2e276ac1681efd002aa4519053ccb25f6f35a7b1113d063eac380c1864765804e2d047f5c109bb60", 0x55}, {&(0x7f0000000340)="bcae31161d030bc4b70e7afd97aac7c6d763b50fade00a4473e408d86d5910781a34eaf1a09d30021e876159387ff981ef7b08ef5c3b02c44b081f69caf74caafe9ee3185dbc1cd99cdaeb2d96da3a827794517621c4d7c28c421765adbb4cf856a647eac8c0977695426b4eb3be6354", 0x70}, {&(0x7f00000004c0)="30807dbf18f210d2f8473c104e03a51d006f2b7b07796937d5ec368c5d67da26f9362856f8394b315a021bb8578afed013a474222b315df2e7e62fa5840c5c65a82c4ddc9c2883914b800b46bc7e2a6cda77abcd1151162b26caa0c0759f75cfa7713914739f8528d34355ad330b3e8b4a79", 0x72}], 0x7) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) write$cgroup_int(r4, &(0x7f00000003c0), 0x12) clock_adjtime(0x0, &(0x7f00000005c0)={0x481, 0x100000000, 0xc0b, 0x2, 0x99, 0x9, 0x5, 0x7, 0x20, 0x1, 0x10000, 0x0, 0x0, 0x7d23, 0x8001, 0x1, 0x9, 0x1000, 0x3, 0x60ad1cea, 0x10001, 0x0, 0x3, 0x10001, 0x23, 0x2}) 10:14:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) setrlimit(0x8, &(0x7f0000000040)) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:08 executing program 2: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:08 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) socket$unix(0x1, 0x5, 0x0) 10:14:08 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x2900, 0x9, &(0x7f00000000c0), 0x4) 10:14:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:08 executing program 2: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8001, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:08 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x2, &(0x7f00000000c0), 0x4) 10:14:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) setrlimit(0x8, &(0x7f0000000040)) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:08 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xfffffffffffffffd, 0x400) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x42f2, 0x4) 10:14:08 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f00000000c0), 0x4) 10:14:08 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000840)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="f4d91400ec03e47f97897922921e400000007b7b90c9b358da5400c46dd5abccf008a69fa715e083d6a02749da4b60ddd49a087141f47259a728285609f59c988d96462ce3d8", @ANYRES16=r3, @ANYBLOB="010026bd7000fcdbdf250d00000020000200040004000800020002000000080001000200000008000200ff070000180002000400040008000100ffffff7f08000200000200003000020004000400040004000400040008000200090000000800020001000000040004000400040008000200000000001400020008000100fdffffff080001008100000064000100380004001400010002004e22ac1414aa0000000000000000200002000a00004000000000fe8000000000000000000000000000bbffff000008000300080000000800030000000000100001007564703a73797a32000000000800030047000000"], 0xf4}}, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.sched_load_balance\x00', 0x2, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000a00)={0x77c}) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000000)="f0b67cedf519992d8b53db4987d75ae6c41042a216d04076aeffa1b2cc9dbd8c4843e248f02eb94825ea76624957b27e9083e076c1a7fadc57f87f6d7e2d7c16", 0x40}, {&(0x7f0000000040)="8de434d604bcbde0fc9fabc803adbf3ae512aaf496b806", 0x17}, {&(0x7f0000000080)="af20b8c8a1161012266357673c6b05980b277dde07b474ef679574b6df6b8741b6a31b297a17ae440157", 0x2a}, {&(0x7f0000000200)="c7060b1910efe42eb7e94d9f7b8c374a81f71be99620eb072effc7ef387b59596b250a6f99554c1fc84d74b738723f0f939badee8f96caf52f666573c8616d6802917df5f96d9a9467213a97b29089a1d47fb5cda3c2c8ac9d275c1d8bf4bcf48044614dcba3e3e8a604ea720b6f88717290def4f43d4b165423657962f7b0671452f9", 0x83}, {&(0x7f00000002c0)="e38fbc72149809d863a307db6414752151a0c1317e265dbf7abece5e3f6eb0f20ee64c57ca1b3157ec25110e7b2e276ac1681efd002aa4519053ccb25f6f35a7b1113d063eac380c1864765804e2d047f5c109bb60", 0x55}, {&(0x7f0000000340)="bcae31161d030bc4b70e7afd97aac7c6d763b50fade00a4473e408d86d5910781a34eaf1a09d30021e876159387ff981ef7b08ef5c3b02c44b081f69caf74caafe9ee3185dbc1cd99cdaeb2d96da3a827794517621c4d7c28c421765adbb4cf856a647eac8c0977695426b4eb3be6354", 0x70}, {&(0x7f00000004c0)="30807dbf18f210d2f8473c104e03a51d006f2b7b07796937d5ec368c5d67da26f9362856f8394b315a021bb8578afed013a474222b315df2e7e62fa5840c5c65a82c4ddc9c2883914b800b46bc7e2a6cda77abcd1151162b26caa0c0759f75cfa7713914739f8528d34355ad330b3e8b4a79", 0x72}], 0x7) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) write$cgroup_int(r4, &(0x7f00000003c0), 0x12) clock_adjtime(0x0, &(0x7f00000005c0)={0x481, 0x100000000, 0xc0b, 0x2, 0x99, 0x9, 0x5, 0x7, 0x20, 0x1, 0x10000, 0x0, 0x0, 0x7d23, 0x8001, 0x1, 0x9, 0x1000, 0x3, 0x60ad1cea, 0x10001, 0x0, 0x3, 0x10001, 0x23, 0x2}) 10:14:08 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)) setrlimit(0x8, &(0x7f0000000040)) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:08 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x80, 0x4) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x321000, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000180)={0x2985, {{0xa, 0x4e20, 0x8000, @rand_addr="65a5c4d1e4d8661e88a4427f71fc74da", 0x2b}}}, 0x88) getsockname(r0, &(0x7f0000000040)=@hci={0x1f, 0x0}, &(0x7f00000000c0)=0x80) connect$can_bcm(r1, &(0x7f0000000100)={0x1d, r2}, 0x10) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000140)=0x1) 10:14:08 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:08 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:08 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x4, &(0x7f00000000c0), 0x4) 10:14:08 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:08 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$selinux_context(r0, &(0x7f0000000100)='system_u:object_r:init_exec_t:s0\x00', 0x21) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) bind$bt_rfcomm(r3, &(0x7f0000000280)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$P9_ROPEN(r3, &(0x7f0000000080)={0x5, 0x12}, 0x18) 10:14:09 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:09 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f00000000c0), 0x4) 10:14:09 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:09 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x101000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000001240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001200)={&(0x7f0000000140)={0x1098, 0x39, 0x310, 0x70bd25, 0x25dfdbfd, {0x1f}, [@generic="435da4bc114853b9e1428010f5ea622c7674c06ee8848b1883c720d1deda6ab67733b2ac756c853c6a3631ed074b431636abe7c375856bc4d02c906544d410831c2e3c3231a985db08f1e360dcc5fd5a6e35ddd7b8f2b551a984de63b64de6a43e629dba6de73a7c7a1b34b40ba0e871482c3d5a5192bc475c026930d90323b13f00876bb18c5a52501980b35813643a2d6d657eea78aeb4ee9e004bc09a39bb99e04e4bafa045ba17a7daff5bbc5af8ed902e63c1951044da97ce579d5f7b3c14a3ed53476b490e9b0fbb024f97d55484aeec6b473b051b9a2195c20eaa44fd81cd2c6668cf8af59930731b78b7c452e1d37b7e21940ff9a096bd7631322d51897b46cd45fbbafc611d8f8c7e609809f7ca602ca8193bd45857bdd42a420e841576698598a7553f15db583ac13725a0ccbac05238a36a2c8d9fadc261e5abddd23f37870e0f36ae01f34a2d0ad3a03e973474a25450bb6a096fc425a79aa5b42c9f951e0c3af91251c032c49090cdbe1161c5c4f0e41bcc3099b94089982cf9a0a836b707e69c31e249064daf708c9cd4d21e66c7dd57e5cde1e2330b336764fe9a43114ada81555495b3e1cd973b6104602caf28833b4e2c6f724d5803e4834ef786cbfc4e2c5770be6ff9288a395b18430186e77e1f48d926ec43fb1d90d12cc1498493cbe0ef3918e61e28871531571cfa259061dc2c5ca64465e8e3efbaae2b70b1b2ab2570054664f520ff4c88ecd69a82cdc7dc64d706c46d167d2d9a904f4c844c57eb77ee7d69721148dc99b6a5df5e0fe6180caae63219bd810e14ede496f403fe60613afb6ea15509cff897ef0c1c83073afadd4d034a69d51de49c3bf086eaa7099dad8a80b90f09c71c28ec0e7ea397537dda7292109ffb4745f1c30e3b30752186036287c18bcdaf63a5876cab3c72aa6d5d72ae4b21bff4a9ca1105500f4db860d6b041bef9088ed599dc71fb03ff2b2ad932f8692eb33b79c3a11b99976300b66961237eed40742daf8c51d85db8958859daee49fd4c3b795ba0afb31242d16f6159d945575f57bd3e924033fd4280ce8d3a64a7b96142ae12a668a9c5d61cf3d436a5a02242dbdd4bdc8f3147c2ef0008d49e01549b3c602cda29e1ee17d5787393091405ebd1b2487cba94bf51728598833f781c56465d66e30b472e99dcb23d1e01abd082d4efe86963b88912f801f7f872a0d3835b5973ddbd51173d049c186dda81ab02df15aefd68999f267c62f46b5faafc1d8ddc939271a626f8d7685833ac5447c59b1400b21546df9ba2ae25b024e8a737aa82a2dc0e7abb7320ab60a7a0b91fc2fe8bde3fb359a0cbb7c2d09ad5e8599fbdba752ffa7d36fc127deb0cf789fafb714ddb89650b7db330314f23a2ad161a3a15d6e64358bffae977d160279db98ae8104c7a0677916a279e51438de579bec4565782a48a0e7e98d464401b313ff4c2460f3e55902d012549634783fea307c529d4d2a78b7f731a60be78cdc68b8ef754a42e6010600d5faf9f60d7043195bcfe7391014e609f40ac9e7fa267ff32889d7a60099ca90ac638588184ea8ec03d821b581a1663af82fe475bee92a01f0b482f0d608b19f4a1dca2dcdaf0fed89c6f65fb81b4f08b9d6bdf5edd70f3d9b7448272f1818c3f05814e8b4c6ad555d989f896a619453ffcddaa94517af2762f4172aff99182f56dfef964f2098e3ca69ac7cec59e01aa68654d5054e5f121bbe5a783ae9d158979edef7d1c978541416311e9c495819f393493d6e42d7ac67ddf9c439280cb696747ea80ab495dad34b32251cb16c449cbfd4f920286ee07945e32c87da88a3aa972075daa4ae47b6e86e82bd7ecf42eb78eaa86c5713f173475b625ab054415fb733aacc1cb12c70852f453e17353327dc00878a62e648952fb90b4c5ff91e06ecee602275bc841e09a43e20ace73c6fe9b6efe22a62c6a9d885faa8962d952af8ad2e65c432edc80372258ef4ea3ef6c156fabf1dfdbd08ae5ec208f4106631036ee1ed6f9c739361d288eba1f1b69f142a04f371deca945c1f25c4e2f2b3d41f4d51c3424fd4ecfa21f300110cf8691866bd3e59d0b6d5255982f6865c47e0d5cd0acfb50037efe4e781929d496ecf1d2209bd1645d21554115272fa331234e5fe4b8bf8b6524481fbcabbe4df3ec15c8ef8a39ca0b5b3912f2d6ab6ce17c0c9b98257a5c25abc1098d2d46b3a49cb7947efee7a54656c8490f4d36559f256006b24c33dc8b792d0b5cfa7e6aff2d8ccdd3614a7a55fbd754cdfbcb73de7ad0ce04965e1fec28dfaa7d353ed37e2ab4d20f0233664f8b88f0d8997338cf980f61e2f2fcc5adf294715b063609d5f3b36e02a0ade8d1253024658369505c029e0c7646b0227598cefe77ee6ff0e0470faeb59086d52b4fd7b07e312a642ae1a14ac42439c5dd292c601a0c72b2deae3c8850c3aed4440896feb080bb1a047162346346c4e476a7ddb75119e359f061e9ecbaae1dee2abac380c1699ab6139b6e3f5e6d05a7ba36aa4ed7bc4074e32d00f8f33632b1019566bbcfb53d404361eb0f2de193c707b2f600e1b874ac1649e159ecec0a6b7de190688d3cca5c3c1e8aa7129b966ce687b9d932d4e3b8f4d959f3dc967aaea20959c94eee7a4ad36775764d7faaa72889affaa6981190bca9781f60071c4c2680871273faddc80d279cbc2fba4c18e2bd11701baf8667668627bae8a7643bdde2684a96060c7a1ed166ed1ac46bc0afda77257847f7bc82dac3a7851c7514abc8935fb23ced00d04e15f6b1ddec4f170cea1b9389ff9d2a297d1048e6ca66307ab28b0aa46e4b058e390f6fad06dcb0c440b9579fce5e0a7187d2e054269fb5018dc9d8e15aeabc0198d80b90a7e52860d7eb0e7b89b61f05dd0e8f958af251fff89cab26ec6bb22422d514275b2f00d13886ebd0c60cc6d5e757e3127f9e3559088e30491e392a24a6b206e73d0dea7b2f0982b61160492ef1aa42e4fff38e3cc8cf01617814db42383eac9c21dfd3eb2816740d3c6e36e92f64018649b603629ca2d05104f30cc9441044db6342f7e88a153fbaae8265c5bc1abb175f926eaa0621be5205268dc68dd9061c83f0b50aedc54415700ba8ab9e3a4f653fc1bc862e452143bad53753a8c83de33c623d8b721194f1106b2b852124f8e5433bdaa0fdc2b406c1cf363a8a5f0344ab7759c4ec0d9240ad443eb8fc3cb01c95d802e1e8a53dc1f02b61a87dfd1890779b3883ff04b747d13b31cbb04d689166d3340011561d39dfb497c04fa233c95b681b7d5f13a91dd8cb1aeead7399c2fc9f3896d0e806a6ebca7e290a4b9da7f7f546121159a814a30f9b1410606023d567c8aefbf0721c6d25fcb86d4f18488cba2a388aa08c41d65b42dc3a2b74de4e23743aa6f8cbb24d80cf22f85d46944e5069fa627d5a45fe1b3cee2330fc4f47e023885117510916eba1ef6ccfb55183461a288439f5a10af9ffe6ba6a6f80ca26f90ed33cb4bf5f44721d22ecb9fa0d674b6b81d5dd32d3777eaf7309cf592f62e2c49de60c71ba1e93c74150de45fe26f9eb1018723b6d28565df47206677f8859c20e83149ebbcc15a5a517001cdd44b2790760ed347e72052450021a8ea52264cce3b240a448a28946c1612b54e07de01e1ba4df1dd70add15d19788fd308be2ce096ab71869de5953fe1c20a09fad64784f2788d505f53c05fbea9fc346adf6d3dbea3a03fe5f1133ec1cf10808fec89f9a0a6cfcd28c2ad9c7fde4a23bddb923d536c778ad887f65b24f53cf0e4ef4acc091c891be1455b779db6fc53383aa718993c7797f283fe3a12917395d315b5291d3ce626a5f19929aafb3b5441282e3f8859b6db5e63c3724660691609e1122244849f02d962ea281237202b010c9e70d5126e125e040c3bfb8e5339c274a6dd9dca0baf320e350e2fc683dd76dd0000ccf6b7761fbeee336fa8f895735934787539884a96377b4dff57c3fdd99cbe1be28a4a709b5c6aeed8de556f0e2add7dd77a351107327ab6aba476f90bb1ddde1d0aaa1ec0d446874d4dc33748a4fcfdc9bab655ca896568fae39b679a18f4c1e8de97800679eba03147b165f7f30f5d793310c3e2f2bc18155ae57dc3dfed9f6b7434cb06a4d797cfac63f0a575b19367f53a043c7772dd84b11506e46e5c595c638b35c3d3d5f02168367ba7996bcca31a76a881a3c4f43014ceda125e0574304f03b87661887e2b2f8406f6f4b0d8384c771c8f8c27763984555b5d5d8b81af0fa9771fcb827ffc8b7c053190b2c64689724fc62ce63f4bc072c13bfaf9c852ae5b6a69410501f984eeb84f29555390270757160e1a94ea67b59b0504367843b12f7c91b8099a098ef89a728044cb69c5b781f886539b8bce715b9d3a64abdeae95e6fa43a69fb49ff45958aa62ef6530b18c9436a38db7a3b5cbcce4c5e52f0396631724d3c6d90ca17fa2c1b96ad0bc167eb068ceebc1da32039c34b14a8183879aec876ed23acaa8fd5bc5c197ed6d41a568d7f1e1104f7f7cbed256583ed97bd7e9d1b7549f8ecb1fdd2bf34ed1d9c3ea99942394aa2daca14b04d72a60534a5c9994e296c350a55eb69c57a61af01c3c8b140df84c655341e299220434bfc74fa485d74c6b76853a3a982984ae282b9abc6b431036f8dea44fe8b94c02be1164d3c456f8d0cf6655e6f11416f538d5016c027aa00d34d93fe06d58ddbd46f265cae98060f5437dbf7c17368afce2c3f8df7bd02bc129ba09a7110119edd7d8058604c25f19df0833c04407f275da5dd7e53f41c666487d7b2658ab3fd61cb6c14b827a0336a0493915016d4b2ea75e3c9a8262d31e9cfa7b0c60ddabf52b3cb1db1b4797ba2749302e79b298b4c6a48edd673e1a76a1b3a4af39a3de92977c1279bf6f4f3ed386c811abc01002e53f46614f3ab2383ae65538c1fddc1d6969da54753464ec5b93a4945a62505d81172d5f45bcf7e1a8ce792ea43bb31a5fcb12d162bbcd94b065f8b7942c99f97eb403b727535bfd807d799886f175f8296dff6e926b64886d64764dbbb55c6679669308a8c8971d9f9978a3ec755465f8f14b72e47095df913bd0249135911a246381e1e25fc9f55a9ecb1d0798d58aa659d3c461ebdca74d3efb9a69d757a35027ae327c340e1f8ca0442eca0c6aa0d144b728ea314b4b44f0bc948bbc3b56ed73dcdf5617546aec3b5e4d5b79a10c4e23eff4a42c6c6207377d0b512c4761acad25483ea6d3663b82d66a932581375aad9ec283f6f2aa6b0b0c4f1219091f542400492d3d16f2e4af53acd790ef23a948466b451613bed9ba9916e23cde9833e82a331351064f1e5f3fe94594f3d3d52bf3b4be27e7c28a961a4ee03c29205c0523fad343dc0d042d14db1dec6b7375469de56e7bf2eac8a04aa58bd5c35fcc13f78392370592250ebf8b14d615bfb0d5f037eb3f8be7c2ee50050b82905472258c6f70dccd0b22d31e7956957a40e1640817c92ecb307a84d963369c370da641164f077212c585f18ed453b5ea05b4b50b72897504cd75e2973542e0f1a385d2b0b9939a4e702474e119fd59698259433eb65fc71ca7e8abb76573d67683c047035bd4cffd962c00ee8e0c7b1a2f49b2332a0a8dc0b26e7f531a72959b6b852292ce145a5d3b17e62164fa41ff25c6156f82b33073b74c2db4551a22bf9671e5e2d8de1824b0b954c6f9f49e21f9c4e5b3458abb1b2d884e8da99bde59ba8864095ae2c89e99763f4543e2bedeb09c6e8ed35a2272bf93dc4ec0ab2dff50a", @typed={0x84, 0x2f, @binary="32cc996686cc807236135c99319fd6533a6c6ee2545e4e32124a63c1cf430beacf01f9506ef2b4e718d612b8ab2a5e09ee8f4f52b3f7b252c4bade42d5054bc94606ba5bfa8ba7bfa7039fc3f3a89b01c537c57cda43b1092a466ee8673baa746fa94d145a53a3969dfbc04a9725f8e739de5eb35111619bc6736b3b8cf0e4"}]}, 0x1098}, 0x1, 0x0, 0x0, 0x1}, 0x4000) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000}, 0xdee}, 0x67) 10:14:09 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x0, &(0x7f0000000480), 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:09 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:09 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:09 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x80000000, &(0x7f0000000080)=0x2) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x0, &(0x7f0000000480), 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:09 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x0, 0x0, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffefffffffe, 0xff, 0x4}, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f0000006440)=ANY=[@ANYBLOB="000033b03eae000000f0ffff0000006ec4f0ffff00"]) prctl$PR_GET_DUMPABLE(0x3) read(r1, &(0x7f0000000a80)=""/245, 0xf5) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000280)) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000180)) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x0, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r3, 0x0, r3, &(0x7f0000000140)='./file0\x00', 0x1400) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x0, 'dh\x00', 0x20, 0x80000000}, 0x2c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) creat(&(0x7f0000000440)='./file1\x00', 0x2) lsetxattr$security_ima(0x0, &(0x7f0000000240)='security.ima\x00', 0x0, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) stat(&(0x7f0000000080)='./bus\x00', 0x0) 10:14:09 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:09 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:09 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x7, &(0x7f00000000c0), 0x4) 10:14:09 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x0, &(0x7f0000000480), 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) [ 177.859347][ T9080] snd_dummy snd_dummy.0: control 120:0:0:Î:0 is already present 10:14:09 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f00000000c0), 0x4) 10:14:09 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, 0x0, 0x0) 10:14:09 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:09 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x48, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x2, @mcast2, 0x200}, @in6={0xa, 0x4e23, 0x734, @remote, 0x7fffffff}, @in={0x2, 0x4e22, @loopback}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x2}, &(0x7f0000000180)=0x8) socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) 10:14:09 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x0, 0x0, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffefffffffe, 0xff, 0x4}, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f0000006440)=ANY=[@ANYBLOB="000033b03eae000000f0ffff0000006ec4f0ffff00"]) prctl$PR_GET_DUMPABLE(0x3) read(r1, &(0x7f0000000a80)=""/245, 0xf5) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000280)) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000180)) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x0, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r3, 0x0, r3, &(0x7f0000000140)='./file0\x00', 0x1400) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x0, 'dh\x00', 0x20, 0x80000000}, 0x2c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) creat(&(0x7f0000000440)='./file1\x00', 0x2) lsetxattr$security_ima(0x0, &(0x7f0000000240)='security.ima\x00', 0x0, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) stat(&(0x7f0000000080)='./bus\x00', 0x0) 10:14:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:10 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:10 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, 0x0, 0x0) 10:14:10 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f00000000c0), 0x4) 10:14:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) [ 178.242797][ T9115] snd_dummy snd_dummy.0: control 120:0:0:Î:0 is already present 10:14:10 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:10 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, 0x0, 0x0) 10:14:10 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:10 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xffffffffffff0001, 0x10000) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x7c71, 0x8, 0x1, 0x0, 0x8]}, 0xe) r1 = socket$unix(0x1, 0x2, 0x0) r2 = syz_open_dev$mice(&(0x7f0000003440)='/dev/input/mice\x00', 0x0, 0x779731ae0f68b09d) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x2, 0x5f, 0xfffffffffffffffa}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r3, 0x7}, &(0x7f00000034c0)=0x62) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000003500)={0x0, 0x2}, 0x8) connect(r1, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f0000000140)={0x7, 0x9, 0x4, 0x1, 0x8}) connect(r1, &(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @my=0x0}, 0x80) rt_sigsuspend(&(0x7f0000000000)={0x5}, 0x8) 10:14:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:10 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x0, 0x0, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffefffffffe, 0xff, 0x4}, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f0000006440)=ANY=[@ANYBLOB="000033b03eae000000f0ffff0000006ec4f0ffff00"]) prctl$PR_GET_DUMPABLE(0x3) read(r1, &(0x7f0000000a80)=""/245, 0xf5) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000280)) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000180)) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x0, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r3, 0x0, r3, &(0x7f0000000140)='./file0\x00', 0x1400) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x0, 'dh\x00', 0x20, 0x80000000}, 0x2c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) creat(&(0x7f0000000440)='./file1\x00', 0x2) lsetxattr$security_ima(0x0, &(0x7f0000000240)='security.ima\x00', 0x0, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) stat(&(0x7f0000000080)='./bus\x00', 0x0) 10:14:10 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x19, &(0x7f00000000c0), 0x4) 10:14:10 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:10 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000040)=0x7fff, 0x8) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:10 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) [ 178.663275][ T9152] snd_dummy snd_dummy.0: control 120:0:0:Î:0 is already present 10:14:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:10 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x3) 10:14:10 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:10 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:10 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) connect(r0, &(0x7f0000000100)=@isdn={0x22, 0x4, 0x80000001, 0x100000001, 0x7}, 0x80) 10:14:10 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x0, 0x0, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffefffffffe, 0xff, 0x4}, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f0000006440)=ANY=[@ANYBLOB="000033b03eae000000f0ffff0000006ec4f0ffff00"]) prctl$PR_GET_DUMPABLE(0x3) read(r1, &(0x7f0000000a80)=""/245, 0xf5) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000280)) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000180)) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x0, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r3, 0x0, r3, &(0x7f0000000140)='./file0\x00', 0x1400) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x0, 'dh\x00', 0x20, 0x80000000}, 0x2c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) creat(&(0x7f0000000440)='./file1\x00', 0x2) lsetxattr$security_ima(0x0, &(0x7f0000000240)='security.ima\x00', 0x0, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) stat(&(0x7f0000000080)='./bus\x00', 0x0) 10:14:10 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:10 executing program 5: socket$unix(0x1, 0x2, 0x0) 10:14:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:10 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x3) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000000)={@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x9, 0xffffffffe0692205, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x3) 10:14:10 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) [ 179.032850][ T9187] snd_dummy snd_dummy.0: control 120:0:0:Î:0 is already present 10:14:10 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = semget$private(0x0, 0x2, 0x61) semctl$SETVAL(r1, 0x1, 0x10, &(0x7f0000000000)=0x1f) 10:14:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:11 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:11 executing program 2: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:11 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x0, 0x0, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffefffffffe, 0xff, 0x4}, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f0000006440)=ANY=[@ANYBLOB="000033b03eae000000f0ffff0000006ec4f0ffff00"]) prctl$PR_GET_DUMPABLE(0x3) read(r1, &(0x7f0000000a80)=""/245, 0xf5) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000280)) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000180)) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x0, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r3, 0x0, r3, &(0x7f0000000140)='./file0\x00', 0x1400) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x0, 'dh\x00', 0x20, 0x80000000}, 0x2c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) creat(&(0x7f0000000440)='./file1\x00', 0x2) lsetxattr$security_ima(0x0, &(0x7f0000000240)='security.ima\x00', 0x0, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) stat(&(0x7f0000000080)='./bus\x00', 0x0) 10:14:11 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') getsockname$ax25(r0, &(0x7f0000000000)={{0x3, @rose}, [@default, @null, @default, @netrom, @netrom, @rose, @null, @bcast]}, &(0x7f0000000080)=0x48) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f00000001c0)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, 0x2, 0x7, 0x3, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10001020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="e0010000", @ANYRES16=r1, @ANYBLOB="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"], 0x1e0}, 0x1, 0x0, 0x0, 0x20008080}, 0x4000) 10:14:11 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', r1}) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:11 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:11 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x10040) fstat(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r0, &(0x7f0000001380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x41244}, 0xc, &(0x7f0000001340)={&(0x7f00000001c0)={0x1168, 0x0, 0x2, 0x100, 0x70bd2d, 0x7, {0xb, 0x0, 0x2}, [@generic="aef5f8e31d1892498aeb0de8b74f785786345c06e2d64a5c600d2517bba66082e4352283cfb3e928", @generic="71199780671f7e60021102dd8af280ab0297a2db430bb56b47d0ee4a6bd6be6a1f5f97dd1694cee19d481066677a298077c2945ea4c825efdac1902b7237641bb629b0e469787c9cc5ce6cc8f217c68a5950acb4cbffd23bacccecff5c04c36bca321f6b8281652b21e8f16a600db6faa61702e30290327249dc54ec5c41c43f5f34d015be90f549a2e9021c3021ad280d00c1db5a76ba8927", @nested={0x34, 0x86, [@generic="077deb571fc8739044e6e9d2540c052b50d2ae5a07bbd20d244046a309b2f2b771acdc6919a5811c1c77117a0d35b03a"]}, @generic="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", @nested={0x8, 0x15, [@typed={0x4, 0x7a}]}, @generic="091b28503c474f5bc6637db9ebc09d923cac7e04c94bd323e13cb1b770a305527869b4cc3d6f791b167fa7cbc68396bd4fb67b51e7b4fe050675fcda8c8d667070b7af5ac0f934c9208e89", @typed={0x4, 0x45}, @typed={0x8, 0x31, @uid=r1}]}, 0x1168}}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x181000, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r3, 0x101, 0x9, &(0x7f00000000c0)=0xfffffffffffffffd, 0x4) 10:14:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:11 executing program 2: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f00000000c0), 0x4) [ 179.408153][ T9221] snd_dummy snd_dummy.0: control 120:0:0:Î:0 is already present 10:14:11 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:11 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:11 executing program 2: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:11 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp\x00') keyctl$session_to_parent(0x12) recvfrom$inet6(r1, &(0x7f0000000040)=""/243, 0x24, 0x2020, 0x0, 0x0) 10:14:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000100)=""/183, 0xb7}, {&(0x7f00000001c0)=""/68, 0x44}], 0x2, &(0x7f0000000240)=""/17, 0x11}, 0x9}, {{&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f0000000300), 0x10000000000001cf, &(0x7f0000000340)=""/56, 0x38}, 0xffffffff}, {{&(0x7f0000000380), 0x80, &(0x7f0000000740)=[{&(0x7f0000000400)=""/37, 0x25}], 0x1, &(0x7f0000000480)=""/240, 0xf0}, 0x5}], 0x3, 0x22, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000700)) sendmsg$key(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x2, 0x15, 0x6, 0x5, 0x8, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_ident={0x2, 0xb, 0x0, 0x0, 0x3}, @sadb_x_nat_t_type={0x1, 0x14, 0x5}, @sadb_address={0x3, 0x17, 0xff, 0x80, 0x0, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}]}, 0x40}}, 0x20000001) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r2, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:11 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x0, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:11 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x880, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040)=0xffffffff, 0x4) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:11 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, "b5c75fb293cf697c0735249e66d5bcd6ab7cdfcc54f7e04816e018eecc99853cbddea118deb590bab92dc6b167fde64e21013c4c3c66e58ac0a96c4f0b8273bfd157f82e686bfaf019e0b39ef3ea502e"}, 0xd8) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:11 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:11 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$input_event(r1, &(0x7f0000000040)={{}, 0x14, 0xd00}, 0x18) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)=0x0) r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x13, &(0x7f00000000c0)={0x4, 0xff, 0x3}) 10:14:11 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x0, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:11 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) connect$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) 10:14:11 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x19, &(0x7f00000000c0), 0x4) 10:14:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x90003, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) 10:14:11 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:11 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0xffffffffffffeffe, 0x8000000000000cf) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:12 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x0, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:12 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x19, &(0x7f00000000c0), 0x4) 10:14:12 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0xfffffffffffffc6a) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) accept4$netrom(r1, &(0x7f00000000c0)={{0x3, @null}, [@bcast, @rose, @bcast, @default, @bcast, @remote, @null, @default]}, &(0x7f0000000140)=0x48, 0x80000) 10:14:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x90003, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) 10:14:12 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x100) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffff48d}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000200)={0x0, r2}) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r3, 0x40045730, &(0x7f0000000040)=0x2) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f0000000080)=0xd90b) 10:14:12 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:12 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:12 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x88040) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@local, @local}, &(0x7f0000000180)=0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'hwsim0\x00', &(0x7f0000000080)=@ethtool_link_settings={0x4d, 0xf4b, 0xffffffffffffff00, 0x3, 0xfffffffffffffff7, 0xb5e, 0xffffffffffffffc0, 0xfffffffffffffffb, 0xf6, 0xfff, [0x100000001, 0xa74, 0x6, 0x50db, 0x10000, 0x2, 0x3, 0x1ff], [0xffffffffffffffff]}}) connect(r0, &(0x7f0000000000)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0xfffffffffffffd65) 10:14:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x90003, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) 10:14:12 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x19, &(0x7f00000000c0), 0x4) 10:14:12 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:12 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x9, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:12 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x90003, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0) 10:14:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:12 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:12 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0)=0x6, 0x4) 10:14:12 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0xc0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x8, 0x80) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000240)={0x6, 0x6, 0x80000000, 0x84000, r1}) r2 = socket$unix(0x1, 0x8, 0x0) connect(r2, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0xfffffffffffffd63) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$llc_int(r3, 0x10c, 0xf, &(0x7f0000000100)=0x80000001, 0x4) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @remote}, {0x2, 0x4e22, @loopback}, {0x2, 0x4e23, @empty}, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f0000000040)='bcsf0\x00', 0x3, 0x8, 0x1}) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000180)={r4, 0x2}) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xea, 0x2000) 10:14:12 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x0, 0x0, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffefffffffe, 0xff, 0x4}, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f0000006440)=ANY=[@ANYBLOB="000033b03eae000000f0ffff0000006ec4f0ffff00"]) prctl$PR_GET_DUMPABLE(0x3) read(r1, &(0x7f0000000a80)=""/245, 0xf5) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000280)) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000180)) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x0, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r3, 0x0, r3, &(0x7f0000000140)='./file0\x00', 0x1400) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x0, 'dh\x00', 0x20, 0x80000000}, 0x2c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) creat(&(0x7f0000000440)='./file1\x00', 0x2) lsetxattr$security_ima(0x0, &(0x7f0000000240)='security.ima\x00', 0x0, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) stat(&(0x7f0000000080)='./bus\x00', 0x0) 10:14:12 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:12 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:12 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f0000000000), 0x4) 10:14:12 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:12 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x48, 0x4000) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e24, @empty}}, 0x0, 0x101, 0x0, "7c48b5dae844f4476e9c9c5e63f75596722aea05ab27337a0e849beda23d276f5e3432c27e0eba1fd94103e1ee6020ca30222ed1f0c10d862ee95ddeec5029b246dd39b93b68ab2b91227ce09164de09"}, 0xd8) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) [ 180.943250][ T9370] snd_dummy snd_dummy.0: control 120:0:0:Î:0 is already present 10:14:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) 10:14:12 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:12 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xfffffffffffefffe) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xffffc00000000000, 0x7}, {0x1ff, 0x2}]}, 0x14, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x976}, @sack_perm, @timestamp, @window={0x3, 0xfe, 0x100}, @sack_perm, @mss={0x2, 0x3}, @window={0x3, 0x587, 0x4}], 0x7) 10:14:12 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:12 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x2802, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000000c0)={0x6, 0x3, @stop_pts=0x1}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@rand_addr, @remote}, &(0x7f0000000180)=0xc) r1 = socket$unix(0x1, 0x2, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffff, 0x2000) mknodat(r2, &(0x7f0000000040)='./file0\x00', 0x10, 0x24) connect(r1, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:13 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x90003, 0x0) 10:14:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:13 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:13 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x7, 0x0, 0x10002, 0x5}) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:13 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x622800, 0x0) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/192, 0xc0}, {&(0x7f0000000180)=""/3, 0x3}, {&(0x7f00000001c0)=""/186, 0xba}], 0x3, &(0x7f00000002c0)=""/196, 0xc4}, 0x40000000) r1 = socket$unix(0x1, 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000640)='/dev/video36\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000580), &(0x7f00000005c0)=0x4) connect(r1, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) open$dir(&(0x7f0000000600)='./file0\x00', 0x80000, 0x100) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) readahead(r0, 0x1, 0x2) getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) lchown(&(0x7f0000000400)='./file0\x00', r2, r3) 10:14:13 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) 10:14:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:13 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0)=0x8000000000, 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x201) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000040)=ANY=[@ANYBLOB]) 10:14:13 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:13 executing program 5: r0 = socket$unix(0x1, 0x4, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:13 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, 0x0, 0x0) 10:14:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) 10:14:13 executing program 4: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:13 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x4, 0x4) prctl$PR_SET_FPEXC(0xc, 0x0) 10:14:13 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f0000000000)=0xfffffffffffffffe, 0xfffffe10) r1 = getpgrp(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x1, r1}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x101000, 0x0) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f00000000c0)={0x1, 'syz1\x00'}) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000080)={0x16000, 0x5, 0x7ff, 0x3, 0xcaf}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000280)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0x0, 0x120, 0x120, 0x0, 0x0, 0x218, 0x218, 0x218, 0x218, 0x218, 0x3, &(0x7f0000000240), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x20}, @empty, 0xffffff00, 0xffffffff, 'lo\x00', 'veth0_to_hsr\x00', {}, {}, 0xff, 0x3, 0x20}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast, 0x3, 0x3, [0x16, 0x2c, 0x6, 0x6, 0x3b, 0x3a, 0x0, 0x2d, 0xf, 0xb, 0x1c, 0x4, 0xe, 0x1d, 0x39, 0x40], 0x0, 0x800, 0x4}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x11}, @broadcast, 0xffffff00, 0xffffffff, 'rose0\x00', 'veth1_to_hsr\x00', {}, {0xff}, 0x32, 0x2, 0x48}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x4db, 0x796b, 0x7, 0x0, 0x1, 0x10001], 0x7, 0x97}, {0x3, [0x7, 0x2, 0x4000, 0x9, 0xff, 0x3], 0xfff, 0x6}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) getsockname$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000140)=0x1c) 10:14:13 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, 0x0, 0x0) 10:14:13 executing program 3: kexec_load(0x90b, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) 10:14:13 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/dsp\x00', 0x800, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000001000)) sendmsg$nfc_llcp(r1, &(0x7f0000001300)={&(0x7f0000001100)={0x27, 0x1, 0x0, 0x7, 0xffffffffffffffe1, 0x3, "b1d9f6c387fef024624c91cfc761526dffb2e8161882683fcf7758d37f731da981856adef3d7c8601671166b0056d1e40f6c30a51abf3ea314ba1e02b93b43", 0x1c}, 0x60, &(0x7f00000011c0)=[{&(0x7f0000001180)}], 0x1, &(0x7f0000001200)={0xd8, 0x10e, 0x4a73, "281e80fc5f2db6a897bc72cfbff8ceddb470df35651bf8aa4be9326d1f060fcb040c81fc5a2a7a06695568e71d628a58818a9544471a058ea8274e0c6bf741f84ca29f473e67dee74e0167922fc304e8e94ff52a098dfbb2cd475a5d8ea374fe63de0c4bc072c3ed243218ccea756f26de309e1f4e6b8de7da50053aac3c913c514ebe9e9e28e2e970e3c737c6641fb1e7e2b3235df5d8cefd0b1bf4221623a22b01cd386922c9021db3fd65dba15a86887c63c5ff814f4a285f4a5108886567e3"}, 0xd8, 0x800}, 0x24044014) sendto(r0, &(0x7f0000000000)="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", 0x1000, 0x0, 0x0, 0x0) 10:14:13 executing program 4: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:13 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, 0x0, 0x0) 10:14:13 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) listen(r0, 0x8) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r1, 0x101, 0x9, &(0x7f00000000c0), 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x40000) sendmsg$nl_crypto(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=@upd={0x118, 0x12, 0x308, 0x70bd2d, 0x25dfdbfe, {{'sha384-generic\x00'}, [], [], 0x2000, 0x2000}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0x8000}, {0x8, 0x1, 0x81}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x401}, {0x8, 0x1, 0x7f}, {0x8, 0x1, 0x5}]}, 0x118}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040050) 10:14:13 executing program 4: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:13 executing program 3: kexec_load(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0xffffffffffffff81}], 0x0) 10:14:13 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) 10:14:13 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:14 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:14 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f0000000000), 0x4) 10:14:14 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x0) 10:14:14 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:14 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x7, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x8000, 0x0) socket$packet(0x11, 0x2, 0x300) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50, 0x0, 0x7, {0x7, 0x1d, 0x40, 0x1000, 0x0, 0x3, 0x1, 0x7}}, 0x50) 10:14:14 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:14 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000000040)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0xffffffffffffffc7) r1 = socket$inet6(0xa, 0x7, 0x3) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) arch_prctl$ARCH_SET_CPUID(0x1012, 0x4000000002) 10:14:14 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:14 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x0) 10:14:14 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:14 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x0) 10:14:14 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x205, 0xca) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:14 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:14 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:14 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x9, 0x200080) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ce\x00'}, 0x14f) socket$unix(0x1, 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x100) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:14 executing program 3 (fault-call:0 fault-nth:0): kexec_load(0x0, 0x0, 0x0, 0x0) 10:14:14 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) recvfrom$inet6(r0, &(0x7f0000000000)=""/105, 0x69, 0x102, &(0x7f0000000080)={0xa, 0x4e20, 0x5e7, @empty}, 0x1c) 10:14:14 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:14 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 10:14:14 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:14 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x200000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x20000010}) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:14 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:14 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x0) 10:14:14 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0xfffffffffffffffe, 0x20000000000002) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x4000, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x10000, 0x4, 0x3, 0x9, 0x3, 0x615b, 0x1, 0xffffffffffffffe1, 0x8, 0x7}) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000100)={0x141, 0x29, 0x2, {0x6, [{{0x72, 0x1, 0x3}, 0xff, 0x7ff, 0x7, './file0'}, {{0x20, 0x3}, 0x40000, 0xfffffffffffffffa, 0x7, './file0'}, {{0x40, 0x1}, 0x7fffffff, 0x10000, 0x7, './file0'}, {{0x1, 0x4, 0x2}, 0x4, 0x6, 0x7, './file0'}, {{0x2, 0x2, 0x7}, 0x7b1c, 0x7, 0x7, './file0'}, {{0x4, 0x2, 0x4}, 0x5, 0x7ff, 0x7, './file0'}, {{0xa, 0x0, 0x2}, 0x1f0, 0xffffffffffff00b9, 0x7, './file0'}, {{0x8, 0x2, 0x3}, 0xfffffffffffffffa, 0x5, 0x7, './file0'}, {{0x0, 0x1, 0x2}, 0x2dc2, 0x1ff, 0x7, './file0'}, {{0xf, 0x3, 0x2}, 0x3ff, 0x8, 0x7, './file0'}]}}, 0x141) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) 10:14:14 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x29, 0xc, &(0x7f00000000c0), 0x4) 10:14:14 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 10:14:14 executing program 3: kexec_load(0x10, 0x0, 0x0, 0x0) 10:14:14 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f0000000000)=0xfffffffffffffffe, 0x4) r1 = fcntl$getown(r0, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x9, &(0x7f0000000040)=""/43) 10:14:14 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) mq_notify(r1, &(0x7f0000000180)={0x0, 0x4, 0x0, @thr={&(0x7f0000000040)="7747a2032487b7c3db84ff550a3855a482b8282b6171d7e26136d26661ce2cc3f8c89e8c96a8d475997f0a7d193fcd63b39ef1b4f48be79a8d988158dad179452a05c911942e0e5057bd036c79e1de2e315a7b6de334307d9846b12e1be5ff6cb482a42349187d9ef26e26d0c455d5ca8c9bce9143956eda886a83c33670e61488f7959d6601939d49857bc7f048e4e2699a0a850759acd222f1714629766457372a081b06bd04c143388630d1f247d1", &(0x7f0000000100)="deb6fae0303977da92821b53ceca17a00fafb5ab892ac3ccd249923729f39d8d993c835174b3ccf7e72d3180dae3efb4ffa9e3d587072ed77da6878c8af0977f0f427ba533e34c609b57015231d8dc9dbf0edd442acc2b4f8b8b9a60c3daa1e78bfa6591d7f2d9ab0ad92aed0a29e9efacd0fbce"}}) 10:14:14 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:14 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 10:14:15 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x2900, 0xc, &(0x7f00000000c0), 0x4) 10:14:15 executing program 3: kexec_load(0x3e00, 0x0, 0x0, 0x0) 10:14:15 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x35126) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:15 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0xa0, 0x1, 0x1, "3a4d2ba24e40627d4ae54476a6de6f2a", "39072fea12524c9a851986a724879dc31e681125871a998d87b093f5959d22113d2cbba57bab155deb96bfb40ad3232dcf215c9871179a2a4faed2749cd12d9482b26ab6b15977987ebdd078d7caa7ba3acd9aa3fd59467f5a94c8e48b9dccd0ab9a42d1679c548b1818774dcbd36c5b9a27b353ac94ae42bd90bd534629ba411065fcaf7266538b32cdbb"}, 0xa0, 0x3) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:15 executing program 0 (fault-call:5 fault-nth:0): mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:15 executing program 3: kexec_load(0x3e0000, 0x0, 0x0, 0x0) 10:14:15 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x2, &(0x7f00000000c0), 0x4) 10:14:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) 10:14:15 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2, 0x0) sendto$ax25(r0, &(0x7f0000000040)="09a8bd1d5013aceb374783841e04e93bd7b60f41b57144ad10ab6440eff7127abcf68dad3f77e395d0c827be98ad3aa924010d1d9056599a8947f63e426a9a1fd8dbe54ad8808215de8d61b1f220cac6dca8524e4917cf9fe97a118e2bbe3facef45d4", 0x63, 0x4000, &(0x7f0000000100)={{0x3, @null, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r1, 0x101, 0x9, &(0x7f0000000180), 0x1) [ 183.435477][ T9631] FAULT_INJECTION: forcing a failure. [ 183.435477][ T9631] name failslab, interval 1, probability 0, space 0, times 1 10:14:15 executing program 3: kexec_load(0x1000000, 0x0, 0x0, 0x0) [ 183.507951][ T9631] CPU: 0 PID: 9631 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #94 [ 183.515877][ T9631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.525925][ T9631] Call Trace: [ 183.525948][ T9631] dump_stack+0x172/0x1f0 [ 183.525968][ T9631] should_fail.cold+0xa/0x15 [ 183.525985][ T9631] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 183.526001][ T9631] ? ___might_sleep+0x163/0x280 [ 183.526021][ T9631] __should_failslab+0x121/0x190 10:14:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f00000000c0), 0x4) [ 183.526034][ T9631] should_failslab+0x9/0x14 [ 183.526047][ T9631] kmem_cache_alloc_node+0x264/0x710 [ 183.526060][ T9631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 183.526080][ T9631] __alloc_skb+0xd5/0x5e0 [ 183.526094][ T9631] ? skb_trim+0x190/0x190 [ 183.526117][ T9631] alloc_skb_with_frags+0x93/0x580 [ 183.526130][ T9631] ? is_bpf_text_address+0xac/0x170 [ 183.526149][ T9631] sock_alloc_send_pskb+0x72d/0x8a0 [ 183.594462][ T9631] ? sock_wmalloc+0x120/0x120 [ 183.599147][ T9631] ? avc_has_perm_noaudit+0x38f/0x570 10:14:15 executing program 3: kexec_load(0x10000000, 0x0, 0x0, 0x0) [ 183.604530][ T9631] ? find_held_lock+0x35/0x130 [ 183.609310][ T9631] sock_alloc_send_skb+0x32/0x40 [ 183.614271][ T9631] __ip_append_data.isra.0+0x19ab/0x2de0 [ 183.620086][ T9631] ? lock_downgrade+0x880/0x880 [ 183.624938][ T9631] ? ip_reply_glue_bits+0xc0/0xc0 [ 183.629980][ T9631] ? __handle_mm_fault+0x21b7/0x3ec0 [ 183.635272][ T9631] ? find_held_lock+0x35/0x130 [ 183.640041][ T9631] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 183.646487][ T9631] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 183.652731][ T9631] ? ip_setup_cork+0x53b/0x870 10:14:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, 0x0, 0x0) 10:14:15 executing program 3: kexec_load(0x3e0000000000, 0x0, 0x0, 0x0) [ 183.657505][ T9631] ip_make_skb+0x249/0x2c0 [ 183.661924][ T9631] ? ip_reply_glue_bits+0xc0/0xc0 [ 183.666952][ T9631] ? ip_flush_pending_frames+0x30/0x30 [ 183.672410][ T9631] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 183.678132][ T9631] ? ipv4_dst_check+0x137/0x180 [ 183.682993][ T9631] ? sk_dst_check+0x350/0x580 [ 183.687758][ T9631] ? sock_def_wakeup+0x280/0x280 [ 183.692702][ T9631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 183.698972][ T9631] udp_sendmsg+0x1db0/0x2820 [ 183.703610][ T9631] ? ip_reply_glue_bits+0xc0/0xc0 [ 183.703630][ T9631] ? udp4_lib_lookup_skb+0x440/0x440 [ 183.703650][ T9631] ? trace_hardirqs_on_caller+0x6a/0x220 [ 183.719645][ T9631] ? __do_page_fault+0x3fb/0xda0 [ 183.724587][ T9631] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 183.730474][ T9631] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 183.736910][ T9631] ? tomoyo_socket_bind_permission+0x340/0x340 [ 183.743165][ T9631] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 183.749415][ T9631] ? copy_msghdr_from_user+0x2d0/0x430 [ 183.754897][ T9631] inet_sendmsg+0x147/0x5d0 [ 183.759396][ T9631] ? udp4_lib_lookup_skb+0x440/0x440 [ 183.764675][ T9631] ? inet_sendmsg+0x147/0x5d0 [ 183.769356][ T9631] ? ipip_gro_receive+0x100/0x100 [ 183.774385][ T9631] sock_sendmsg+0xdd/0x130 [ 183.778800][ T9631] ___sys_sendmsg+0x3e2/0x930 [ 183.783479][ T9631] ? copy_msghdr_from_user+0x430/0x430 [ 183.789020][ T9631] ? lock_downgrade+0x880/0x880 [ 183.793874][ T9631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 183.800118][ T9631] ? kasan_check_read+0x11/0x20 [ 183.804972][ T9631] ? __fget+0x381/0x550 [ 183.809133][ T9631] ? ksys_dup3+0x3e0/0x3e0 [ 183.813632][ T9631] ? get_pid_task+0xc9/0x190 [ 183.818233][ T9631] ? find_held_lock+0x35/0x130 [ 183.823001][ T9631] ? __fget_light+0x1a9/0x230 [ 183.827672][ T9631] ? __fdget+0x1b/0x20 [ 183.831743][ T9631] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 183.838004][ T9631] ? sockfd_lookup_light+0xcb/0x180 [ 183.843212][ T9631] __sys_sendmmsg+0x1bf/0x4d0 [ 183.847895][ T9631] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 183.852925][ T9631] ? kasan_check_write+0x14/0x20 [ 183.858050][ T9631] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 183.864285][ T9631] ? fput_many+0x12c/0x1a0 [ 183.868699][ T9631] ? fput+0x1b/0x20 [ 183.872508][ T9631] ? ksys_write+0x1f1/0x2d0 [ 183.877012][ T9631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 183.882644][ T9631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 183.888099][ T9631] ? do_syscall_64+0x26/0x610 [ 183.892771][ T9631] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.898834][ T9631] ? do_syscall_64+0x26/0x610 [ 183.903510][ T9631] __x64_sys_sendmmsg+0x9d/0x100 [ 183.908532][ T9631] do_syscall_64+0x103/0x610 [ 183.913221][ T9631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.919104][ T9631] RIP: 0033:0x458da9 [ 183.922997][ T9631] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.942769][ T9631] RSP: 002b:00007f95e65a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 183.951175][ T9631] RAX: ffffffffffffffda RBX: 00007f95e65a1c90 RCX: 0000000000458da9 10:14:15 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 10:14:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, 0x0, 0x0) [ 183.959157][ T9631] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 [ 183.967136][ T9631] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 183.975100][ T9631] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95e65a26d4 [ 183.983065][ T9631] R13: 00000000004c5fac R14: 00000000004da760 R15: 0000000000000004 10:14:16 executing program 0 (fault-call:5 fault-nth:1): mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:16 executing program 3: kexec_load(0x100000000000000, 0x0, 0x0, 0x0) 10:14:16 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f00000000c0), 0x4) 10:14:16 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, 0x0, 0x0) 10:14:16 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) connect$x25(r1, &(0x7f0000000140)={0x9, @null=' \x00'}, 0x12) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x7, 0x4, 0x207, 0x4, 0x1000, 0x3, 0x80000000, 0x9, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r3, 0x3}, 0x8) setsockopt$ax25_int(r0, 0x101, 0xb, &(0x7f0000000000)=0x200000, 0x4) 10:14:16 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000000140)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0xfe8c) connect(r0, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e22, 0x0, @local, 0x4}}, 0x80) fdatasync(r0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000100)=0x3, 0xbc28, 0x3) 10:14:16 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x3, 0x1, 0x1000, &(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3}, 0xfffffedb) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:16 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:16 executing program 3: kexec_load(0x1000000000000000, 0x0, 0x0, 0x0) 10:14:16 executing program 5: connect(0xffffffffffffffff, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) sysfs$1(0x1, &(0x7f0000000100)='!wlan1mime_typetrusted.\x00') ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000000)={0x1, "5e3bafa7e601303ffbb593772a632367a8c4d7225a09f7250999f2052028179f", 0x3, 0x5, 0x7f, 0x3619e4, 0xc}) r0 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0xffff, 0x252001) accept4(r0, 0x0, &(0x7f0000000400), 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0], 0x1}) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000340)={0x3, @null, r1}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000180)={0x43fb, 0x7b1, 0x7}) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 10:14:16 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x4, &(0x7f00000000c0), 0x4) [ 184.311538][ T9682] FAULT_INJECTION: forcing a failure. [ 184.311538][ T9682] name failslab, interval 1, probability 0, space 0, times 0 [ 184.403762][ T9682] CPU: 1 PID: 9682 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #94 [ 184.411704][ T9682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.421763][ T9682] Call Trace: [ 184.425073][ T9682] dump_stack+0x172/0x1f0 [ 184.429448][ T9682] should_fail.cold+0xa/0x15 [ 184.434051][ T9682] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 184.439877][ T9682] ? ___might_sleep+0x163/0x280 [ 184.444840][ T9682] __should_failslab+0x121/0x190 [ 184.449793][ T9682] should_failslab+0x9/0x14 [ 184.454307][ T9682] kmem_cache_alloc_node_trace+0x270/0x720 [ 184.460132][ T9682] __kmalloc_node_track_caller+0x3d/0x70 [ 184.465783][ T9682] __kmalloc_reserve.isra.0+0x40/0xf0 [ 184.471177][ T9682] __alloc_skb+0x10b/0x5e0 [ 184.475603][ T9682] ? skb_trim+0x190/0x190 [ 184.479959][ T9682] alloc_skb_with_frags+0x93/0x580 [ 184.485079][ T9682] ? is_bpf_text_address+0xac/0x170 [ 184.490284][ T9682] sock_alloc_send_pskb+0x72d/0x8a0 [ 184.495495][ T9682] ? sock_wmalloc+0x120/0x120 10:14:16 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f00000000c0)=0xa) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x3) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) [ 184.500202][ T9682] ? avc_has_perm_noaudit+0x38f/0x570 [ 184.505583][ T9682] ? find_held_lock+0x35/0x130 [ 184.510364][ T9682] sock_alloc_send_skb+0x32/0x40 [ 184.515321][ T9682] __ip_append_data.isra.0+0x19ab/0x2de0 [ 184.520965][ T9682] ? lock_downgrade+0x880/0x880 [ 184.528375][ T9682] ? ip_reply_glue_bits+0xc0/0xc0 [ 184.533411][ T9682] ? __handle_mm_fault+0x21b7/0x3ec0 [ 184.538715][ T9682] ? find_held_lock+0x35/0x130 [ 184.543502][ T9682] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 184.549930][ T9682] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 184.556187][ T9682] ? ip_setup_cork+0x53b/0x870 [ 184.560963][ T9682] ip_make_skb+0x249/0x2c0 [ 184.565390][ T9682] ? ip_reply_glue_bits+0xc0/0xc0 [ 184.570417][ T9682] ? ip_flush_pending_frames+0x30/0x30 [ 184.575887][ T9682] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 184.581617][ T9682] ? ipv4_dst_check+0x137/0x180 [ 184.586476][ T9682] ? sk_dst_check+0x350/0x580 [ 184.591166][ T9682] ? sock_def_wakeup+0x280/0x280 [ 184.596112][ T9682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.602362][ T9682] udp_sendmsg+0x1db0/0x2820 [ 184.607081][ T9682] ? ip_reply_glue_bits+0xc0/0xc0 [ 184.607104][ T9682] ? udp4_lib_lookup_skb+0x440/0x440 [ 184.607124][ T9682] ? trace_hardirqs_on_caller+0x6a/0x220 [ 184.623047][ T9682] ? __do_page_fault+0x3fb/0xda0 [ 184.628001][ T9682] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 184.633904][ T9682] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 184.633923][ T9682] ? tomoyo_socket_bind_permission+0x340/0x340 [ 184.633943][ T9682] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 184.652871][ T9682] ? copy_msghdr_from_user+0x2d0/0x430 [ 184.658350][ T9682] inet_sendmsg+0x147/0x5d0 [ 184.662861][ T9682] ? udp4_lib_lookup_skb+0x440/0x440 [ 184.668162][ T9682] ? inet_sendmsg+0x147/0x5d0 [ 184.672846][ T9682] ? ipip_gro_receive+0x100/0x100 [ 184.677877][ T9682] sock_sendmsg+0xdd/0x130 [ 184.682300][ T9682] ___sys_sendmsg+0x3e2/0x930 [ 184.687167][ T9682] ? copy_msghdr_from_user+0x430/0x430 [ 184.692651][ T9682] ? lock_downgrade+0x880/0x880 [ 184.697516][ T9682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.703770][ T9682] ? kasan_check_read+0x11/0x20 [ 184.708633][ T9682] ? __fget+0x381/0x550 [ 184.712807][ T9682] ? ksys_dup3+0x3e0/0x3e0 [ 184.717222][ T9682] ? get_pid_task+0xc9/0x190 [ 184.721815][ T9682] ? find_held_lock+0x35/0x130 [ 184.726583][ T9682] ? __fget_light+0x1a9/0x230 [ 184.731258][ T9682] ? __fdget+0x1b/0x20 [ 184.735328][ T9682] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 184.741567][ T9682] ? sockfd_lookup_light+0xcb/0x180 [ 184.746773][ T9682] __sys_sendmmsg+0x1bf/0x4d0 [ 184.751470][ T9682] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 184.756505][ T9682] ? kasan_check_write+0x14/0x20 [ 184.761464][ T9682] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 184.767716][ T9682] ? fput_many+0x12c/0x1a0 [ 184.772151][ T9682] ? fput+0x1b/0x20 [ 184.775964][ T9682] ? ksys_write+0x1f1/0x2d0 [ 184.780482][ T9682] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 184.785944][ T9682] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 184.791390][ T9682] ? do_syscall_64+0x26/0x610 [ 184.791405][ T9682] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.791417][ T9682] ? do_syscall_64+0x26/0x610 [ 184.791438][ T9682] __x64_sys_sendmmsg+0x9d/0x100 [ 184.791454][ T9682] do_syscall_64+0x103/0x610 [ 184.791471][ T9682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.791486][ T9682] RIP: 0033:0x458da9 [ 184.826236][ T9682] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.845826][ T9682] RSP: 002b:00007f95e65a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 10:14:16 executing program 0 (fault-call:5 fault-nth:2): mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:16 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x39, &(0x7f0000000000)=')vboxnet0&posix_acl_accessGPL%@vboxnet1system)nodevem1@}\x00'}, 0x30) getpriority(0x2, r0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r1, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:16 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f00000000c0), 0x4) 10:14:16 executing program 3: kexec_load(0x0, 0x10, 0x0, 0x0) 10:14:16 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x147440) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x3}, 0x4) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:16 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), 0x4) [ 184.854223][ T9682] RAX: ffffffffffffffda RBX: 00007f95e65a1c90 RCX: 0000000000458da9 [ 184.862176][ T9682] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 [ 184.870140][ T9682] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 184.878140][ T9682] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95e65a26d4 [ 184.886099][ T9682] R13: 00000000004c5fac R14: 00000000004da760 R15: 0000000000000004 10:14:16 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x29, 0x6, &(0x7f00000000c0), 0x4) 10:14:16 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x6, r2, 0x1}) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:16 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:16 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) eventfd(0x8) ioctl$KDMKTONE(r1, 0x4b30, 0x4) [ 185.009034][ T9718] FAULT_INJECTION: forcing a failure. [ 185.009034][ T9718] name failslab, interval 1, probability 0, space 0, times 0 10:14:16 executing program 3: kexec_load(0x0, 0x3e00, 0x0, 0x0) [ 185.133467][ T9718] CPU: 0 PID: 9718 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #94 [ 185.141391][ T9718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.151446][ T9718] Call Trace: [ 185.154749][ T9718] dump_stack+0x172/0x1f0 [ 185.159101][ T9718] should_fail.cold+0xa/0x15 [ 185.163695][ T9718] ? __nf_conntrack_find_get+0xe41/0x1970 [ 185.169430][ T9718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 185.175238][ T9718] ? __nf_conntrack_find_get+0xe41/0x1970 [ 185.180952][ T9718] ? kasan_kmalloc+0x9/0x10 [ 185.180977][ T9718] __should_failslab+0x121/0x190 [ 185.180997][ T9718] should_failslab+0x9/0x14 [ 185.194899][ T9718] kmem_cache_alloc+0x47/0x6f0 [ 185.199672][ T9718] ? __nf_conntrack_find_get+0xe68/0x1970 [ 185.205396][ T9718] __nf_conntrack_alloc+0xdb/0x6c0 [ 185.210523][ T9718] init_conntrack.isra.0+0xe2c/0x1170 [ 185.215927][ T9718] ? nf_conntrack_alloc+0x50/0x50 [ 185.220973][ T9718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 185.227223][ T9718] ? ipt_do_table+0xf1e/0x1b90 10:14:17 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x7, &(0x7f00000000c0), 0x4) [ 185.231998][ T9718] nf_conntrack_in+0xd93/0x1410 [ 185.236864][ T9718] ? nf_conntrack_update+0x960/0x960 [ 185.242151][ T9718] ? __do_replace+0x910/0x910 [ 185.242175][ T9718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 185.242187][ T9718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 185.242204][ T9718] ipv4_conntrack_local+0x169/0x210 [ 185.242219][ T9718] nf_hook_slow+0xbf/0x1f0 [ 185.242239][ T9718] __ip_local_out+0x403/0x880 [ 185.242253][ T9718] ? ip_finish_output+0xd50/0xd50 [ 185.242272][ T9718] ? ip_append_data.part.0+0x170/0x170 [ 185.253152][ T9718] ? ip_make_skb+0x1b1/0x2c0 [ 185.253168][ T9718] ? ip_reply_glue_bits+0xc0/0xc0 [ 185.253190][ T9718] ip_local_out+0x2d/0x1b0 [ 185.285134][ T9718] ? udp4_hwcsum+0x2ea/0x4b0 [ 185.285157][ T9718] ip_send_skb+0x42/0xf0 [ 185.303801][ T9718] udp_send_skb.isra.0+0x6b2/0x1180 [ 185.313198][ T9718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 185.319448][ T9718] udp_sendmsg+0x1dfd/0x2820 [ 185.324045][ T9718] ? ip_reply_glue_bits+0xc0/0xc0 [ 185.329095][ T9718] ? udp4_lib_lookup_skb+0x440/0x440 [ 185.334378][ T9718] ? trace_hardirqs_on_caller+0x6a/0x220 [ 185.340016][ T9718] ? __do_page_fault+0x3fb/0xda0 [ 185.344957][ T9718] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 185.350848][ T9718] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 185.357259][ T9718] ? tomoyo_socket_bind_permission+0x340/0x340 [ 185.363413][ T9718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 185.369681][ T9718] ? copy_msghdr_from_user+0x2d0/0x430 [ 185.375145][ T9718] inet_sendmsg+0x147/0x5d0 [ 185.379650][ T9718] ? udp4_lib_lookup_skb+0x440/0x440 [ 185.384936][ T9718] ? inet_sendmsg+0x147/0x5d0 [ 185.389611][ T9718] ? ipip_gro_receive+0x100/0x100 [ 185.394633][ T9718] sock_sendmsg+0xdd/0x130 [ 185.399054][ T9718] ___sys_sendmsg+0x3e2/0x930 [ 185.403746][ T9718] ? copy_msghdr_from_user+0x430/0x430 [ 185.409228][ T9718] ? lock_downgrade+0x880/0x880 [ 185.414103][ T9718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 185.420358][ T9718] ? kasan_check_read+0x11/0x20 [ 185.425229][ T9718] ? __fget+0x381/0x550 [ 185.429402][ T9718] ? ksys_dup3+0x3e0/0x3e0 [ 185.433816][ T9718] ? get_pid_task+0xc9/0x190 [ 185.438388][ T9718] ? find_held_lock+0x35/0x130 [ 185.443135][ T9718] ? __fget_light+0x1a9/0x230 [ 185.447957][ T9718] ? __fdget+0x1b/0x20 [ 185.452010][ T9718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 185.458238][ T9718] ? sockfd_lookup_light+0xcb/0x180 [ 185.463430][ T9718] __sys_sendmmsg+0x1bf/0x4d0 [ 185.468129][ T9718] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 185.473137][ T9718] ? kasan_check_write+0x14/0x20 [ 185.478067][ T9718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 185.484291][ T9718] ? fput_many+0x12c/0x1a0 [ 185.488685][ T9718] ? fput+0x1b/0x20 [ 185.492473][ T9718] ? ksys_write+0x1f1/0x2d0 [ 185.496959][ T9718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.502398][ T9718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.507832][ T9718] ? do_syscall_64+0x26/0x610 [ 185.512486][ T9718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.518526][ T9718] ? do_syscall_64+0x26/0x610 [ 185.523185][ T9718] __x64_sys_sendmmsg+0x9d/0x100 [ 185.528107][ T9718] do_syscall_64+0x103/0x610 [ 185.532677][ T9718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.538545][ T9718] RIP: 0033:0x458da9 [ 185.542426][ T9718] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.562012][ T9718] RSP: 002b:00007f95e65a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 185.570438][ T9718] RAX: ffffffffffffffda RBX: 00007f95e65a1c90 RCX: 0000000000458da9 [ 185.578398][ T9718] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 [ 185.586363][ T9718] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 185.594417][ T9718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95e65a26d4 [ 185.602372][ T9718] R13: 00000000004c5fac R14: 00000000004da760 R15: 0000000000000004 10:14:17 executing program 0 (fault-call:5 fault-nth:3): mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:17 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f00000000c0), 0x4) 10:14:17 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x2900, 0x6, &(0x7f00000000c0), 0x4) 10:14:17 executing program 3: kexec_load(0x0, 0x3e0000, 0x0, 0x0) 10:14:17 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000540)) syz_emit_ethernet(0x0, &(0x7f00000007c0)=ANY=[], &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x0, 0x0, 0x15c]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000380)={0x0, 0x7, 0xffffffffffffffff}) r1 = socket$isdn_base(0x22, 0x3, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000200)) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:17 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400002, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000040)={{0x1, 0x3, 0x1, 0x0, 0xfffffffffffffff8}, 0xfffffffffffffffa, 0xffffffff, 0x8001}) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mISDNtimer\x00', 0x24000, 0x0) fstat(r0, &(0x7f00000002c0)) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r1, 0x101, 0x0, &(0x7f00000000c0), 0x4) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/61, 0x3d) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000180)) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000001c0)="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") setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000380)={0x5, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}}}, 0x88) 10:14:17 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:17 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x2, &(0x7f00000000c0), 0x4) [ 185.766926][ T9758] FAULT_INJECTION: forcing a failure. [ 185.766926][ T9758] name failslab, interval 1, probability 0, space 0, times 0 10:14:17 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xd949fcd5ab0a9c3e) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0xff, 0x4) 10:14:17 executing program 3: kexec_load(0x0, 0x1000000, 0x0, 0x0) [ 185.855284][ T9758] CPU: 1 PID: 9758 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #94 [ 185.863222][ T9758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.873287][ T9758] Call Trace: [ 185.876587][ T9758] dump_stack+0x172/0x1f0 [ 185.880935][ T9758] should_fail.cold+0xa/0x15 [ 185.885548][ T9758] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 185.891370][ T9758] __should_failslab+0x121/0x190 [ 185.891387][ T9758] should_failslab+0x9/0x14 [ 185.891406][ T9758] __kmalloc_track_caller+0x6d/0x740 [ 185.891426][ T9758] ? lock_downgrade+0x880/0x880 [ 185.891441][ T9758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 185.891454][ T9758] ? nf_ct_ext_add+0x2a9/0x640 [ 185.891474][ T9758] __krealloc+0x71/0xc0 [ 185.900887][ T9758] nf_ct_ext_add+0x2a9/0x640 [ 185.930942][ T9758] init_conntrack.isra.0+0x439/0x1170 [ 185.936328][ T9758] ? nf_conntrack_alloc+0x50/0x50 [ 185.941369][ T9758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 185.947614][ T9758] ? ipt_do_table+0xf1e/0x1b90 10:14:17 executing program 5: r0 = socket$unix(0x1, 0xfffffffffffffffd, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x9, 0x10000, {0x8, 0xd18b}, {0x0, 0xfff}, @ramp={0x8, 0xd0, {0x3, 0x0, 0x1, 0x372d}}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000780300000000000000000000000000000000000078010000a8020000a8020000a8020000a8020000a802000003000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/48], @ANYBLOB="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"/888], 0x3d8) 10:14:17 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f00000000c0), 0x4) [ 185.952400][ T9758] nf_conntrack_in+0xd93/0x1410 [ 185.957275][ T9758] ? nf_conntrack_update+0x960/0x960 [ 185.962571][ T9758] ? __do_replace+0x910/0x910 [ 185.967268][ T9758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 185.973519][ T9758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 185.979794][ T9758] ipv4_conntrack_local+0x169/0x210 [ 185.984999][ T9758] nf_hook_slow+0xbf/0x1f0 [ 185.989435][ T9758] __ip_local_out+0x403/0x880 [ 185.994120][ T9758] ? ip_finish_output+0xd50/0xd50 [ 185.999158][ T9758] ? ip_append_data.part.0+0x170/0x170 [ 186.004724][ T9758] ? ip_make_skb+0x1b1/0x2c0 [ 186.009316][ T9758] ? ip_reply_glue_bits+0xc0/0xc0 [ 186.014334][ T9758] ip_local_out+0x2d/0x1b0 [ 186.014347][ T9758] ? udp4_hwcsum+0x2ea/0x4b0 [ 186.014363][ T9758] ip_send_skb+0x42/0xf0 [ 186.014379][ T9758] udp_send_skb.isra.0+0x6b2/0x1180 [ 186.014392][ T9758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.014414][ T9758] udp_sendmsg+0x1dfd/0x2820 [ 186.014438][ T9758] ? ip_reply_glue_bits+0xc0/0xc0 [ 186.048782][ T9758] ? udp4_lib_lookup_skb+0x440/0x440 [ 186.054078][ T9758] ? trace_hardirqs_on_caller+0x6a/0x220 [ 186.059724][ T9758] ? __do_page_fault+0x3fb/0xda0 [ 186.064687][ T9758] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 186.070596][ T9758] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 186.077031][ T9758] ? tomoyo_socket_bind_permission+0x340/0x340 [ 186.083194][ T9758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 186.089451][ T9758] ? copy_msghdr_from_user+0x2d0/0x430 [ 186.094953][ T9758] inet_sendmsg+0x147/0x5d0 [ 186.099465][ T9758] ? udp4_lib_lookup_skb+0x440/0x440 [ 186.104749][ T9758] ? inet_sendmsg+0x147/0x5d0 [ 186.109449][ T9758] ? ipip_gro_receive+0x100/0x100 [ 186.114500][ T9758] sock_sendmsg+0xdd/0x130 [ 186.118924][ T9758] ___sys_sendmsg+0x3e2/0x930 [ 186.123591][ T9758] ? copy_msghdr_from_user+0x430/0x430 [ 186.129037][ T9758] ? lock_downgrade+0x880/0x880 [ 186.133869][ T9758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.140093][ T9758] ? kasan_check_read+0x11/0x20 [ 186.144930][ T9758] ? __fget+0x381/0x550 [ 186.149071][ T9758] ? ksys_dup3+0x3e0/0x3e0 [ 186.153472][ T9758] ? get_pid_task+0xc9/0x190 [ 186.158048][ T9758] ? find_held_lock+0x35/0x130 [ 186.162800][ T9758] ? __fget_light+0x1a9/0x230 [ 186.167457][ T9758] ? __fdget+0x1b/0x20 [ 186.171513][ T9758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 186.177736][ T9758] ? sockfd_lookup_light+0xcb/0x180 [ 186.182927][ T9758] __sys_sendmmsg+0x1bf/0x4d0 [ 186.187602][ T9758] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 186.192711][ T9758] ? kasan_check_write+0x14/0x20 [ 186.197642][ T9758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 186.203862][ T9758] ? fput_many+0x12c/0x1a0 [ 186.208347][ T9758] ? fput+0x1b/0x20 [ 186.212137][ T9758] ? ksys_write+0x1f1/0x2d0 [ 186.217011][ T9758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 186.222453][ T9758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 186.227897][ T9758] ? do_syscall_64+0x26/0x610 [ 186.232555][ T9758] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.238606][ T9758] ? do_syscall_64+0x26/0x610 [ 186.243270][ T9758] __x64_sys_sendmmsg+0x9d/0x100 [ 186.248192][ T9758] do_syscall_64+0x103/0x610 [ 186.252771][ T9758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.258644][ T9758] RIP: 0033:0x458da9 [ 186.262527][ T9758] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.282112][ T9758] RSP: 002b:00007f95e65a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 186.290591][ T9758] RAX: ffffffffffffffda RBX: 00007f95e65a1c90 RCX: 0000000000458da9 [ 186.303331][ T9758] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 [ 186.311284][ T9758] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 186.319326][ T9758] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95e65a26d4 [ 186.327289][ T9758] R13: 00000000004c5fac R14: 00000000004da760 R15: 0000000000000004 10:14:18 executing program 0 (fault-call:5 fault-nth:4): mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:18 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f00000000c0), 0x4) 10:14:18 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000040)={0x3, "20ffb8"}, 0x4) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:18 executing program 5: r0 = socket$unix(0x1, 0xffffffffbfffffff, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:18 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x19, &(0x7f00000000c0), 0x4) 10:14:18 executing program 3: kexec_load(0x0, 0x10000000, 0x0, 0x0) 10:14:18 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000001080)='team\x00') getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000010c0)={@ipv4={[], [], @broadcast}, 0x0}, &(0x7f0000001100)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000011c0)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001300)={{{@in6=@mcast1, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001400)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001440)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000001540)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000001580)={@remote, 0x0}, &(0x7f00000015c0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000001600)={@remote, @rand_addr, 0x0}, &(0x7f0000001640)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001800)={'team0\x00', 0x0}) getsockname$packet(r1, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000018c0)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f00000019c0)=0xe8) getpeername$packet(r1, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001a40)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001c00)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001d00)={'bcsh0\x00', 0x0}) accept4$packet(r1, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001d80)=0x14, 0x80800) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000001dc0)={@local, @multicast1, 0x0}, &(0x7f0000001e00)=0xc) getsockname$packet(r1, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001f40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001f80)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000002080)=0xe8) accept$packet(r1, &(0x7f0000002240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002280)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000029c0)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0xa00000}, 0xc, &(0x7f0000002980)={&(0x7f00000022c0)={0x6a4, r2, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r4}, {0xc4, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xff}}}]}}, {{0x8, 0x1, r9}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}]}}, {{0x8, 0x1, r11}, {0x274, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r14}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x1f, 0x76, 0x570, 0x40}, {0x80000001, 0x7, 0x80000000, 0x7}, {0x4, 0x3ff, 0x10000, 0x2}, {0x5, 0x1, 0x4e54, 0x3}, {0x402, 0x79c, 0x1ff, 0x4}, {0x0, 0x0, 0x1, 0x3}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r15}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}]}}, {{0x8, 0x1, r17}, {0x1bc, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x0, 0x2, 0x8000, 0x2d3}, {0x7fffffff, 0x7fffffff, 0x800, 0xffffffffffff82e7}, {0x1, 0x9, 0x10001, 0xfffffffffffffff8}, {0x10000, 0x5, 0xffffffffffffff80, 0x81}, {0xffffffffffffffc0, 0xff, 0x81, 0x7}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x74}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}]}}]}, 0x6a4}}, 0x8000) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000040)="c7c90335f944993d6e7bce3f9478d70e9f6405fd7e17d112eca1a0974bc0502eb135b22505814ef653340bf73cbcaae5ecbfa05d2961af970475b30e51624806fa06053dc3474189f8921d5a43591c75681e56f5e348bdbc6dad686c01e8ecb94788a9ee23f3b5289f4c02d897f05c090f63bcedf9ce8c0d13738041bb054093d3a351b3947790c406db2dde536c4a31f50adf02dabc4e14a406d0a54fcd03ba567932e3d5398a87e154213d6178c643ff8ff3405dc4e492a4455557b3a057b4061afbac8f35175b778ad2eb43e954ced1c0db2aad3f1099ba866bca96ac08339b9dc4424b93c58ac43ee9940f8a6d286236f7dd2db135c0aa969def0a3b2dd1cfbffffdd107f4c8067a5061cc4dab18d8c95027bc06af60a38d8177cfd6e482e6be978f9e59ec89de15948ea78b2997b7f997f4db44ca49e82001e1108b114ca7610a3d18d8a1ad46086fb493af04e3d5062e8fb88199e7eea39abdfea43c71586e876f3184146394fd53b27ac879d6c957e9206ad83cd66cec964df21c03d0b8e324f33d4fcd1ffce271b68a348854a8a4eb386a7bdcfb049381c8f554bd424715ed5bb9ee30e40e1959981f287bfec905a63520cc84283798481aa03767074a4238fc819d4b56c31dbbbcae3c8390b2bdbf07b61f154d58b739eeee51c9a793c894f646e2b8dd12161f93a38a4c2197789ca1e2c46c62570acbc680e9e7a7276d5b2d2b1a1687b29334cef1b6f8a55119a419443a9a9e0158d5acbf581505886b00d9bafbf40ad372caa0ca007ad7e76fb256bb35233cb145a9fbeca7a8fb8c3ed83bbbbf595a9c76bfdd1232bb64877196da20c8ea5e598b919c8aeaa0ccadd83b27d352bf0762bce32e35d6b2dbd65e6c06870396000434949e73caf62a0b7b7ceea1b9cf900a77e3d20a9c01ef8f59404d55ede6d294b0f1c219d23b825baee1ae80ac04d48d22eec52111ca26619d0ad0a376aa9e9176865a800be1c28772f4ca29d5f423753a71df0afd41776b062f31cb0eaa5fca445e77c1efcf56330471537e46e41b2985958d5b3982bfb272ca6fb395f75ce3e3bc6e61a645a39aca5b71db6d4b4db679472c3e472ce6361baeb9f110acbbcd08eae76e486bfec04dc6344e5b951129d44418951327e6c56495ae18cb94af913f3d614cd3331574acb1feea81bfe87b9bd9b8855ad00b32831c06ecf07f04f03a66c9183f048b24866f67e21491f1d9aaed5de935037996fd00f72d82b26294e434b2041a58999a6ded0a5f738d741699c33c2a9c62ad23a37058336c03b8b00c59f35d1be8a95099965825f69a2dda046585721eb61088893d9a301a93f27828dfed695e822394e90d3c55b8d93f9be4280123fae1ab1a70935ea365ac600f0b8863fc0dcdf95a8ffa6c81992da6423bfbe8ab4a4478fa1e3ddbce5b42e8afaa4e8be1187cc9d49fce835ee47905763d7cdb96dda40ea941007c3d5f9583e6ff93e864a64f76286f1730563d6670d889c59923f2d91ebb7f547d5463a9eec963c233695fbbbaaf5a5bdc90d0a8a7c6b0d3e0ec99f4cb8e104d94c256e316f247615aa16d01f7788db04821037832972508578011e456a5c99fb3a27cb39349ae56acb5fe3b8ce497d6baf2228d86d55f84ffb27ff240094dc4a93f83b03fb9bf94b0e3d398efecfcde2c178cc69f2e70e96b2619806f1ae774b6211055f4b96ba0ef7013ea64e8c4b011ecf021f6af5b5615c31c3a588100f09440ebb8de732f839ccc1924ed27975f351872f5b7d8f3dd92fffdfd5d529add5059676bc25734fe14bbe6cc9f26dccdbe88d330d00a9e70709cac3edd67de7072fa08820a7cfc98fde6789f2b819d0c295232830abe57df9de5a51dba7d58a0e33e009d30b436008688f3490c222cd3d3c4387fd2745ff11d6cec1e6d2d79ca0e72872c8c8a821e3587313d8f95e98228010ea39a8f3a749fa1ce5438122746a258cdbe453b820c779feb10a5a36bfdee0f388edd678ec7ecbfdde501f07a45ef8587d11ec513c0d1d2e69567ecba4bae2afe6b2cda93781a0ab3deca720903cb1d9790b7da943a02aa2ba5a4f5894f56cbb2012e9ea6c88925748c8162e9bbde939e52b6dae30e5b301cb6d5c66e0b4f08cd60cf77376cad392fc7489097ef92a11b2aa6c332e73bade7a64df6e8f30246f39546c6bcb9703271f755296477fed81cc6a8f8ea8cdace1fcfd3c7741ac52ad4481eefa5febbf7c823ba9c15fcaf8ffe93931546badbabb39e774a77c4227c6ca7df6bb01facd0cd6b442b5f08a12f06212f7dc2ead235e9b5f20cfbfd28f3eb8da2c9075eb5122c40e6d19566bf8897928a992323d846f0457da72a579de0be3e97cf001b30697909cc24f8e85151b826584029c1314b7a97945b4b57d5c02e2e98cf99f3ac6bc7b123773a4f0e040e145e733bee1a870bab5758235124ce95ca28dce2ecba138f814a6e953df1d37f464bdcf4527e886000711839a3ae00212428155ee3c1da225cbf228a174ad3b80c1a8e0ce74f80d11eb4446fc4061f67bb5916ad9d0e552e57c1346b9f14139ce74eb167ac29831dd6df19da7563eef91275034eff4ff6087850d4b7095ab1e3b2bc4e7241cad51bb64a51fc4a142284b66b86f3d8bad8a810f01227c71e8ae82fff1369c4da939d6c9221f91e91755fd62bcdee32877f74c61dd17d6df73176f6099f6204442db258c283ddbeb8f10ba150e178c1097d63abc2d5470e969e7eeef3ced087a423b2852cf9f7cbac8ad18b9ab731462e1d6ae7c40e265ac95decbbb91aeece7bdea857460dfa63511da8a9a498e7db8fe9db43bd7e9fc6a9f28ddb05aae9598ba6233425b66b834c29625cadd9a4e1125b6e61f0ec5d282935d240ea3bd530b5a76f89497a6e3942483ee4e6ae0727f1035e9c91be483ae19db01f95ee50af483afad34d4b83c26ac715ca86f57af0d29d109e38c8d5b8090241afec5912a92f6cadde3ebfdf07112711b22af3ba1f7af99d6347e2408feb304c2a7a9e6e2e86a27ff607d905290e121f2ef6bbcddaf74c8af396f698f8f6ad3b07ce165ac801a64e488e92eb4397cb7994e5af9d1dfb0d516cf4d7808d4eb7859eb7969c546cbc1bdaf53a996a8b03465d59a3ed7d58718ff6b18c0199fab3ab00095da2047c17d35df4bf0b4e4db5ea8f85c178a3e1a71e8e29dc73b9ece8af3242c8bbbf21802f59eae8d63ca7673124aa06c51ac304b0ef591d9ebdd50550bb9dd69bd52c8cf303bd3b4332e857646a0f842f829b7d58920183c97c3d515d9c58229c22affdaeb5f4b40f6d097667d8fb78da0bc3d8bb4541e2887596ea0e60a67a47f979339e81b7716c83b92a2769c54b3cd38452c86c00c9d72adaca342c4136da0aa04c1851a8b6a647ae53eca641273c7c83b4f9412b72781a3daaf96ee05d68f75e15226a0d706bfbe6f0bfb10b1d15a9bf0a1f9f1d459b46f57b7e35e357f068f217c49cbdf02194afd26df025aa6f562d14cc0cec1c02b8f473324571c368c810f6de2117abaa930f5a89d7cef7902983f1def02e722d037fc3abf42fe7c5bdd193ffe112069b2babf78a0014bb89c43c842bf12e32f66dda255524f37a8e6a3e758adde851e84b47a691ea73ce1dc9f29774b711e3950d90d5121e85fe53aa6143d49f9ffbe71a9ae6fa02353ffe2c0c8b416c34937bb95f96526d83e5d266b2e70de0fbac66d59ef846bb3a4a5c5954e7948e6d149995b98c6a11a59b7bf27af3db11e66f02197218af1bda495ecc0dfee8a90ff0f088e55f72819492d784b67e87468cae34e2e2527480635b4e3a956eb45b33e22875fe27a0ab0b1dc645156ce85e5efc4cad6e072da8289d776b628f7b0b7efe800cc5fcfde78f93d9f5f8ac0ad3e5f24611ca13a229013e9d60149be97417b0a3a0404a6258ed28c091d0d1396c821ab6c5cff85890a3cd04c1cb23fff4b89394e9e230964197b110f580585f202cc89c82702082afc8e0f7e7dbcd6c3c69eaebe3fef3a69b4815d399e1c6f469771d32e3c27b6597dffda234517fd2fd7b13b5d3034a193dcaf1fe1fad3be42c540acf222091bbfd7448ff956b63d766fd996a3bdaefb3e391d52088e647ea52cab14782ed1ef67a96d41d166fd286dd95b0ec406bd0b5073d776b0dc9bcb4dc5e1f5ef9ff4d376efa6e9d9b5d72c3c8291524caccf0b21bfbab54c76d33f06bcca066e29f259165f747f14a97ded9e92736262678a2336edf03a717b77ae124c225462e5fb1a23f0fcb105da9f2ee36465d0d83bbc48283866936fc763706f6e483ac899100fb6d7503d2809bf07156b21e61ab404e2e3be89435f7d98fbfbde5d92843bc4f21bbec06073d0a4d644c3d2f8090f6a366f47330a908ddb9ef84e7137efa3e88ca7593d83f568bbfb623dba421b1a66d70947fa5bb74c75161e504163e61ca8d4a2ef953b53ba4d82d125f4b77aa4776b5ae7702b33d0bf540c0b8e6e5b2e26cda26b2af9f13205bfffc365fbed758003c7c79e97e7e5a447126d87dcb862765d2eb473ba377980b28e870d9d8bd9051baba53ccd450826a53be7590eac3c313abed665705a8af02c15e8066361f6e0a373600723a6b3e73f0c0582a50993f27bd0eb83dcfb5169f24f115b2ad2b8ed23336d1e74fc7dc31397be47b40efd53044e5ded5a3cb6b2b923ad90df8aab131ac068b3c48e7ed844ecf53fecccfb26df756d85fff9887559b3ebc65e6ed3fba37b14fc6fc00ea1520493f83404aa498cc67331191bea4c72e07348ab4bf44a0e0b79d536a1028c42b393e926af0aafffe146283678697c74519789800219261cfe1df0949369304f959dafbcde8cbca267d8f6fe98e0a7732aaaba3cae4a58907223c854980d914c4771968438153bd981c7a1c1dd0fe2d41ed398e50ced040a29cdc465b50b27c377df340fbf94e4b4e2f0352623fb359d15158e0ccc5b277f63dc387e0ebf09a558b0fc7e8243d6585cd0b1e89a93ec4508670446bbb69f52ffb85234b9971ca7c821073acad78c5402da56f82ad399ff9639009450de0884c3f90329d10ff5b975fda3fef98d04396a34e7d87e0c6c66d75057a254472e6dcd6598077b61268795d640293469ee1f9477c5f23a5f2d84b67a64c06fc0e261c53d0690d07f5abbe128ae01445bf400e55ba6fd30500991bdd589f3daa3fd83ae6a8977b401656842af3a0dcbc70b41cbbe8e6465384f75037885b8cc38b31be99ad3878c748f9fb1abe299d096c6ffe9afb7cdcd43f8f38a01c3a1ae9efc35217c13590e5215f12460478ef1b5b1a6e9cf09281ff29df8f96c96bea436f04fac631b6906d35f41a89373e92ae328c9ea8ed639a0047f0968bebce9f41247ae1ffb7899ce4edb0eb29033bca92203be07637299be3a49ab3ec5ce9313dfe338094fa79bf05178c5e6ff37bcc09208c76b39695db4c13c0ba17c5115e5ea30779961688e8c553b686c5a05613646b30f4951429368d55375a8f10122d2218d218ca2ecc26ffd72c5330e2e73cdc2d530cfa287335783288e59720838ac6776b479a910357c1894e696fdc246fef18362f1346a8300296b195408fd98d1b76a8656b81e4e73069a5418fbac9a5315c5798f1aa3ef61c8f76002fa473e8e2a94d279bee658c04996bc97632862bc4e8edd7b49b28bb27ac67798ade0499827c2afc4ea53ac9150423396a929653b60d968189361b459be4689ec52d0222383739afda2e36e373150c67b0f42e4ff2febd965b1bd45a9b112f9e24b754099bd3c3d8bcbd927a4e60db17a62c") 10:14:18 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x4, &(0x7f00000000c0), 0x4) 10:14:18 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:18 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x3) 10:14:18 executing program 3: kexec_load(0x0, 0x3e0000000000, 0x0, 0x0) [ 186.543030][ T9795] FAULT_INJECTION: forcing a failure. [ 186.543030][ T9795] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 186.644453][ T9795] CPU: 1 PID: 9795 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #94 [ 186.652397][ T9795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.662483][ T9795] Call Trace: [ 186.665788][ T9795] dump_stack+0x172/0x1f0 [ 186.670137][ T9795] should_fail.cold+0xa/0x15 [ 186.674740][ T9795] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 186.680566][ T9795] ? ___might_sleep+0x163/0x280 [ 186.685433][ T9795] should_fail_alloc_page+0x50/0x60 10:14:18 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) connect$ax25(r0, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x600, 0x0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000100)={0x6, 0xda0a, 0x1}) [ 186.690650][ T9795] __alloc_pages_nodemask+0x1a1/0x8d0 [ 186.696044][ T9795] ? ip_local_out+0xcc/0x1b0 [ 186.700643][ T9795] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 186.706361][ T9795] ? ip_send_skb+0xc6/0xf0 [ 186.710772][ T9795] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 186.710849][ T9795] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 186.710869][ T9795] alloc_pages_vma+0xdd/0x540 [ 186.728179][ T9795] wp_page_copy+0xc85/0x1740 [ 186.732774][ T9795] ? find_held_lock+0x35/0x130 [ 186.737558][ T9795] ? pmd_pfn+0x1d0/0x1d0 [ 186.741793][ T9795] ? lock_downgrade+0x880/0x880 [ 186.741807][ T9795] ? __pte_alloc_kernel+0x220/0x220 [ 186.741825][ T9795] ? kasan_check_read+0x11/0x20 [ 186.741839][ T9795] ? do_raw_spin_unlock+0x57/0x270 [ 186.741855][ T9795] do_wp_page+0x48e/0x1500 [ 186.741869][ T9795] ? do_raw_spin_lock+0x12a/0x2e0 [ 186.741883][ T9795] ? rwlock_bug.part.0+0x90/0x90 [ 186.741901][ T9795] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 186.781544][ T9795] ? add_mm_counter_fast.part.0+0x40/0x40 [ 186.784240][ T9812] ax25_connect(): syz-executor.2 uses autobind, please contact jreuter@yaina.de [ 186.787277][ T9795] __handle_mm_fault+0x22e8/0x3ec0 [ 186.787296][ T9795] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 186.787316][ T9795] ? find_held_lock+0x35/0x130 [ 186.799233][ T9814] ax25_connect(): syz-executor.2 uses autobind, please contact jreuter@yaina.de [ 186.801583][ T9795] ? handle_mm_fault+0x322/0xb30 [ 186.801609][ T9795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.801628][ T9795] ? kasan_check_read+0x11/0x20 [ 186.801646][ T9795] handle_mm_fault+0x43f/0xb30 [ 186.801670][ T9795] __do_page_fault+0x5ef/0xda0 [ 186.846436][ T9795] do_page_fault+0x71/0x581 [ 186.850933][ T9795] page_fault+0x1e/0x30 [ 186.855080][ T9795] RIP: 0010:__put_user_4+0x1c/0x30 [ 186.860171][ T9795] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 00 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 186.879761][ T9795] RSP: 0018:ffff88805b867cb8 EFLAGS: 00010293 [ 186.885814][ T9795] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020007ff8 [ 186.893766][ T9795] RDX: 0000000000000dfd RSI: ffffffff819ace93 RDI: 0000000000000286 [ 186.901719][ T9795] RBP: ffff88805b867ee0 R08: ffff88808eb282c0 R09: 0000000000000001 [ 186.909673][ T9795] R10: ffff88808eb28b40 R11: ffff88808eb282c0 R12: 0000000000000000 [ 186.917624][ T9795] R13: 0000000000040000 R14: 0000000020007fc0 R15: 00000000000001a7 [ 186.925594][ T9795] ? __might_fault+0x1a3/0x1e0 [ 186.930350][ T9795] ? __sys_sendmmsg+0x203/0x4d0 [ 186.935186][ T9795] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 186.940199][ T9795] ? kasan_check_write+0x14/0x20 [ 186.945128][ T9795] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 186.951348][ T9795] ? fput_many+0x12c/0x1a0 [ 186.955837][ T9795] ? fput+0x1b/0x20 [ 186.959629][ T9795] ? ksys_write+0x1f1/0x2d0 [ 186.964120][ T9795] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 186.969561][ T9795] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 186.975005][ T9795] ? do_syscall_64+0x26/0x610 [ 186.979675][ T9795] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.985722][ T9795] ? do_syscall_64+0x26/0x610 [ 186.990391][ T9795] __x64_sys_sendmmsg+0x9d/0x100 [ 186.995316][ T9795] do_syscall_64+0x103/0x610 [ 186.999893][ T9795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.005780][ T9795] RIP: 0033:0x458da9 [ 187.009655][ T9795] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.029240][ T9795] RSP: 002b:00007f95e65a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 187.037637][ T9795] RAX: ffffffffffffffda RBX: 00007f95e65a1c90 RCX: 0000000000458da9 10:14:18 executing program 0 (fault-call:5 fault-nth:5): mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:18 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f00000000c0), 0x4) 10:14:18 executing program 3: kexec_load(0x0, 0x100000000000000, 0x0, 0x0) 10:14:18 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000040)) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000140)=0x80a0) 10:14:18 executing program 5: socketpair(0x5, 0xa, 0x8, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x181040, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x1a) connect(r1, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:18 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xf0) setsockopt$ax25_int(r0, 0x101, 0xb, &(0x7f0000000040)=0x80000000000, 0xc931d034789efb4a) [ 187.045596][ T9795] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 [ 187.053558][ T9795] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 187.061512][ T9795] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95e65a26d4 [ 187.069565][ T9795] R13: 00000000004c5fac R14: 00000000004da760 R15: 0000000000000004 10:14:19 executing program 3: kexec_load(0x0, 0x1000000000000000, 0x0, 0x0) 10:14:19 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x7, &(0x7f00000000c0), 0x4) 10:14:19 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000000080)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0xffffffffffffffc4) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x200) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000100)=""/150, &(0x7f0000000040)=0x96) 10:14:19 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) r1 = socket(0x5, 0x6, 0x80000001) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:14:19 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20001, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0xb0de, 0x52, 0x0, &(0x7f0000000040)}) 10:14:19 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:14:19 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f00000000c0), 0x4) 10:14:19 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x10) 10:14:19 executing program 1: getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x5, &(0x7f0000000100)={r0, @in6={{0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x26}, 0x59}}}, 0xffffffffffffff94) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r1, 0x101, 0x1, &(0x7f00000001c0), 0x4) 10:14:19 executing program 5: r0 = socket$unix(0x1, 0xfefffffffffffffa, 0x0) connect(r0, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x2, 0x2, 0x1, {0xa, 0x4e24, 0x400, @dev={0xfe, 0x80, [], 0xd}, 0x5}}}, 0x80) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) 10:14:19 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x2) 10:14:19 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:19 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0xf8772a38090914c, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000280)=0x7) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x202, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x56, "3ceaefb0807ffd22e7847f9fcf5037043ff5753d1abac5d754fee935239b6e93c291ea07a7d16a353d0f96b0ccf43c34e9c2fd0edc2651e6ab409fc15cc95fbcc3b256f9503fd8444a9ca9f4d8cc66f6677a57b133f7"}, &(0x7f0000000100)=0x5e) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000240)={'bond_slave_1\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="2b0000008c5c073ba0859f493a53c08f37eeb7a8f1b2d4de34b7463b55b352e02838d8b28415090ad43fe55af39f82"], &(0x7f0000000180)=0x33) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f00000001c0)={0x1121, 0xf, 0x0, 0x7c}) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000200)) 10:14:19 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x3e00) 10:14:19 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xb, &(0x7f0000000100), 0x4) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffb000/0x3000)=nil, 0x80000001, 0x7, 0x4, &(0x7f0000ffd000/0x3000)=nil, 0xffffffffffff257c}) 10:14:19 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) r2 = geteuid() syz_mount_image$hfsplus(&(0x7f00000011c0)='hfsplus\x00', &(0x7f0000001200)='./file0\x00', 0x9a9, 0x3, &(0x7f0000001440)=[{&(0x7f0000001240)="c1ad03c90f7ab1c30d434f266ec86f75ae60f15caeeaf7b53c2a045dbe115dec2d8c27e4c5e6c1d29427f0bb9026fb3473c2dc8c78bb45947a5beab6d8333356e6911008ab1cb95c1e4b84592a58c4a25ebee2bb83e84707438ac6f0a5b5f70c0776b2eeb13ba753c09ae673fd131b3f3d402826acb776a670094df0c3c409ab640ddd856d85278776e16213b9045f133bfb", 0x92, 0x6}, {&(0x7f0000001300)="1dd412d6d27cd45fbed26301d67b659d6a4041668096858eaf5aea132f335521385f20c40dfed34c2531c141c560b2fead9d72dfab2b1eeda2760e523accf07da7427b640e1eeb77de21b3a5ad31e1522de755e2927482b7530a821dba4b745a2ba21a59c07307b7fd29646b2e4eadddcbc1160955375cab60d24ca2ed594c8740ebfc1e295c9280ec51194704f8d9fd5c94325c122905f06b97b5673ee789a39cbd12f7c970aae68ce8662b5da62655a6", 0xb1, 0x8}, {&(0x7f00000013c0)="ed6a864dd4295d12e4f54787439969da8f774374162307bdd8c8cd61f16b750b3dd56272d479036df56a875ea07927d664d30fc59eb40184d2eb5b791b74d9e41b98520f", 0x44, 0x8001}], 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB="73726561746f723df2e2e3822cdaa6fe749280de70a0bb626172726965722c636f6e746578743d757365725f752c66736d616769633d3078303030303030303d0000", @ANYRESDEC=r2, @ANYBLOB=',func=FILE_MMAP,subj_role=vboxnet1/\',subj_user=nat\x00,fsuuid=b2v?4avv-duwc-917f-?5w7-0c?uu57a,pcr=00000000000000000055,\x00']) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000001600)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000015c0)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000001640)={0x8, 0x120, 0xfa00, {0x1, {0x7ff, 0xfffffffffffffffd, "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", 0xef, 0xff, 0xca7, 0x9, 0x7, 0x7fffffff, 0x101, 0x1}, r3}}, 0x128) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000001100)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000100)=""/4096}, &(0x7f0000001180)=0x78) connect(r0, &(0x7f0000000080)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0xfffffffffffffecf) 10:14:19 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x3e0000) 10:14:19 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f00000000c0), 0x4) 10:14:19 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000002500)={0x2, 0x0, @loopback}, &(0x7f0000002540)=0x10, 0x80000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000002580)={0x2, 'bpq0\x00', 0x3}, 0x18) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f00000000c0)=0x2, 0x4) 10:14:19 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x4) 10:14:19 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 10:14:19 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x1000000) [ 187.757611][ T9889] hfsplus: unable to parse mount options 10:14:19 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) 10:14:19 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast}) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x480) 10:14:19 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0xfffffffffffffdb1) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) r4 = syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x1ff, 0x44000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000004c0)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000500)=0x28) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000540)={r5, @in6={{0xa, 0x4e22, 0x2, @rand_addr="fc80f721ce5e0963b69a11f676e922a4", 0x8000}}, 0x2, 0xb, 0x81, 0x9d37, 0x3f440000000000}, &(0x7f0000000600)=0x98) setgroups(0x3, &(0x7f0000000440)=[r1, r2, r3]) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=r7, @ANYBLOB="feff05000700726a040008000200"], &(0x7f0000000200)=0x12) ioctl$SG_SET_COMMAND_Q(r6, 0x2271, &(0x7f0000000240)=0x1) syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x6, 0x400000) fcntl$setstatus(r0, 0x4, 0x6000) 10:14:19 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0)=0x1, 0x4) 10:14:19 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x10000000) 10:14:19 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x7) 10:14:19 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x19, &(0x7f00000000c0), 0x4) 10:14:19 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x3e0000000000) 10:14:20 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x100000000000000) 10:14:20 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000040)=0x81) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) setsockopt$ax25_int(r1, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:20 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0x3, @broadcast, 'ip_vti0\x00'}}, 0x80) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000000)=0x8) 10:14:20 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x9) 10:14:20 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0)=0x2, 0x4) 10:14:20 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x7, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3de, 0x200000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x401, 0x6}, &(0x7f0000000080)=0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f00000002c0)=0xc) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001700)={0x6000, &(0x7f00000016c0), 0x8, r1, 0x3}) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r1, &(0x7f0000001640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001600)={&(0x7f0000000380)={0x1248, 0x4, 0x7, 0x10, 0x70bd26, 0x25dfdbff, {0x0, 0x0, 0x3}, [@typed={0x8, 0x5c, @pid=r3}, @generic="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", @generic="ae91c92de83fbf79678529a53fd6665aa2228ed087d93fd21f200ce24c502bb89f5017e7d8a3620b7969fbc743a5a818299739ee173dd2c44ff127140f8b4238f4806be0ffcca6a28992019c8f91f3c978424f6e11547a32d5bc74b9b8b45b3ef0b589d00bdd47c7ebcf43ae1be7c3076c37e2fff7593e863cdb4597587936acdd8cadf844e9935b24f86ce899", @typed={0x14, 0x53, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @typed={0x8, 0x57, @ipv4=@loopback}, @generic="1a51c1a48387dba9b50287797041a71e7404a3566be0bfb92d03f32f46c81a9968b6c6b2cf2a4fced82f860618ca3472ed1d7928bb5b04c3d40cc116634d62d937e73527b7fb7fe225bc43b157b4e27b6fbdd7c9800581c7fabc50f980caff04d44194bb5808d3c2c8361326febcc6250761eb4d741b4068341687acdfd7736c87e95f4a9a8bbad73838618864f52596cd4315fc838c2dda6da5f418cc3647944522b6045089b334e4a2725db3a6f5de79641281185cc1929be023af1aae4e910d3c7950359d739cb6db0c2802c8ec50f882f80ee34a8d7788e6e17a60e64b62bd4ae1d274e53e871f0d198a91394be35fb7790d71e613", @generic="804c52c24e61ab3d5e203a8df66d5ff37aebb1169d3dfbfbc9f283dfdf824214ada89a71656e344c3bfdc682b0694582d63348fb2ba2db0aa3b998c32538b9f1caf2a88c97ec35a9866febda09e54507d916f50935d5a0a64cb3e49a739036d858dfbd8316b52320628438e4e31ab915604af417eb8d96", @typed={0xc, 0x46, @u64=0x6c}, @typed={0x8, 0x85, @uid=r4}]}, 0x1248}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r2, 0x4}, &(0x7f0000000140)=0x8) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000001680)={0x1, 0x0, 0x103, 0x2, {0x5, 0x100000000, 0x8001}}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00fb400700205a72e441f5fb5198800d46f390fdc74fea89921e8c147af8868ff88b9510519dff024900000000000000765a0e49f8f50353980000000000000026ebcda172cb1043ccb4552a6a"], 0x40, 0x2) [ 188.235899][ T9951] QAT: Invalid ioctl 10:14:20 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0)=0x2000000, 0x4) [ 188.275119][ T9951] QAT: Invalid ioctl 10:14:20 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x1000000000000000) 10:14:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x12800) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4200, 0x0) 10:14:20 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x1) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000100)={0xa, 0x3, 0x6, 0xffff}, 0xa) connect$vsock_dgram(r1, &(0x7f0000000140)={0x28, 0x0, 0xffffffff}, 0x10) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r2, 0x101, 0x9, &(0x7f00000000c0)=0x8, 0x4) 10:14:20 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x4000, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000001c0)) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x101000) fallocate(r2, 0x28, 0xd3, 0x10001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) eventfd2(0x80000001, 0x80000) 10:14:20 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0xa) 10:14:20 executing program 3: kexec_load(0x24000, 0x0, 0x0, 0x320001) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000040)) 10:14:20 executing program 2: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f00000000c0), 0x4) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x800, 0x8800) bind$llc(r0, &(0x7f0000000100)={0x1a, 0x32f, 0x1, 0x4, 0x100000001, 0x7fff}, 0x10) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000040)={0x56, 0xb, 0x3}) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000080)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) 10:14:20 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0)=0x200000000000000, 0x4) 10:14:20 executing program 1: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000240)={0x0, 0x0, [], @raw_data=[0xe32, 0x0, 0x3, 0x7f, 0x8001, 0x1, 0x7, 0xff, 0xc2, 0x3ff00000, 0x9, 0x56c2, 0x3, 0x8, 0x8, 0xfffffffffffffff9, 0x400, 0x1, 0x5d, 0x3711, 0x9, 0x1, 0x85, 0x40, 0x0, 0x100, 0x160, 0x6, 0x7fffffff, 0xeb4, 0x80000001, 0xdbaf]}) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r3, 0xc0345642, &(0x7f0000000040)={0x140, "60372d78fd16bce9c183c65c78a1429ab85c2e9fbbad48b99f36b6978a065560", 0x1, 0x1}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x200, 0x70bd2a, 0x25dfdbff, {}, [""]}, 0x1c}}, 0x800) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000300)=0x40, 0x4) setsockopt$ax25_int(r2, 0x101, 0x9, &(0x7f00000000c0), 0x4) rmdir(&(0x7f0000000340)='./file0\x00') 10:14:20 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0xe) 10:14:20 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x12840, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000080)={0x4, 0x925, 0xfffffffffffffff9, {r1, r2+30000000}, 0x6, 0x101}) 10:14:20 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:20 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@bcast, @bcast, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) mkdirat(r0, &(0x7f0000000540)='./file0\x00', 0x80) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x7f, 0x1, &(0x7f0000000280)=[{&(0x7f0000000180)="60bc26c2e5fe04a4b30c6e18b5d472e029b54d7572673d20243decfec9ae2f5d60a88b09111cd8c39b002ebdaaa43593824a19c1e42cc023fa5b38300c36e36b90c5a7ededf1a03b79783d3e8a2bb412aec4f263378f63580f23b3c75bc57ec3c26f9ed7ba9881db613a259d40e9bc9443adb4f1a8761ea47a9c33287f8eb70ce7f291bdb04710442eb44c7cdd0cf64e73e27e15b41a9978fa5b2a88aad59284bf42af6e11d50ffb0fdcd7ccc3551325660b515b2b699e257b1b7505645324d8ff9e78dfcd4f4f380a2ad6a1bdb6c5f0c9c0a0e3c170", 0xd6, 0x8}], 0x0, &(0x7f00000004c0)={[{@dots='dots'}, {@dots='dots'}, {@dots='dots'}, {@fat=@nfs='nfs'}, {@nodots='nodots'}], [{@euid_eq={'euid', 0x3d, r1}}, {@uid_gt={'uid>', r2}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r3, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:20 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), 0x3) 10:14:20 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x1, 0x4) 10:14:20 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r1 = shmget(0x3, 0x4000, 0x78000102, &(0x7f0000ffc000/0x4000)=nil) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000140)=""/146) shmctl$SHM_LOCK(r1, 0xb) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x4) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) kexec_load(0x0, 0xe0, 0x0, 0x4) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000100)) 10:14:20 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000001c0)=0x1) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0xffffffff7ffffffe, 0x6003) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000080)=0x0) finit_module(r2, &(0x7f0000000140)='#em1trustedmime_typemime_type\'\\*\x00', 0x2) ioctl$VIDIOC_S_STD(r2, 0x40085618, &(0x7f0000000100)=r3) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000280)={{0x1, 0x0, 0x3, 0x0, 0x4800000}, 0x4, 0x3}) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000000)={0xd8, 0x6709, 0x3ff, 0x9, 0x10}) setsockopt$ax25_int(r1, 0x101, 0x9, &(0x7f00000000c0), 0x4) 10:14:20 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) 10:14:20 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xfffffffffffffffe) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x100, 0x8, 0x6, 0x4, 0x8001}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r2, 0x6}, 0x8) 10:14:20 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x11) 10:14:20 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000040)={0x5, 0x0, [{}, {}, {}, {}, {}]}) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r1, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:20 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@generic={0x10, "2f19cb73448dcd2318837147afa73a51d89bf6c3e19cca7d87077dee361e8f02bdfdd85727985d64ba5640236a0916fe1bc4a646021d9e6a763f47632f7069cce10646fda5c85d1e15c0c0c5454142d2e620111c87702a829fd8985fd488eaf5b9ca02cca1252f9c8925827d0c7f7d9532d17b5ccdebb5beb5e04d4ae5b2"}, 0x80) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000040), 0x4) 10:14:20 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000040)) 10:14:20 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x1c) 10:14:20 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 10:14:20 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) bind$can_raw(r0, &(0x7f0000000100)={0x1d, r1}, 0x10) r2 = syz_init_net_socket$ax25(0x3, 0x7, 0x0) setsockopt$ax25_int(r2, 0x101, 0xc, &(0x7f00000000c0)=0x4, 0xffffffffffffffc9) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 10:14:20 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x0) sendto$rose(r0, &(0x7f0000000100)="516a697f5947e924d49e2e39c80120ec747a6c4c8a39e15f6c309acda1ba5034e4108a58bafaa7ac999d8034020f2bb0914fda14a9ca93a569ef4265ac0658e7f56ed2b1d1a7d08a90e0ca710f71aac0b83905e4853ccb2ba7bd7f7aede8962a15b549f08960ece578c8aec7502a15b3b86598a5ca7dfe440892739dd0d09351213db4a90590dcd1ab2af0339171e9a236a44607e357e6d4a05048eadebc637caf0480937d5395818cef902550dd350535dd8cfef90934662d645146e451072c81d5238f699b2f1a067cbcba9bd2566a594202", 0xd3, 0x20040000, &(0x7f0000000040)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x1, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}, 0x40) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r1, 0x101, 0x6, &(0x7f00000000c0), 0x4) 10:14:20 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000931ff4)=@x25={0x9, @remote={[], 0x3}}, 0x80) 10:14:20 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x1, 0x1) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f00000000c0), 0x4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf={0xda, &(0x7f0000000100)="accbb1b158d907015fbb645d3e121169cc198d31c1f1086ece0adf98bb6f224820d25855a0121fa27dde8383840f542caaa3429c7832b1710a56e58392f6c9ef8a36b6fb771777f003419e8b5ec31de7e0d6a099de45ed4855dc6cf84487333ccd9ff3911db1f8b1fc596a088ba20c4dd3b12deb0b9486ed9c48e10e04a5178b4c0c8509975e515d4ca090ecd384f0644f0e00c843b41dd969ca299a0e65188dbba5708f62a8757bb4f31c55f2f3531c1949e91a74b38c4c59278f6a33fcdda24e2cfa194375b84e974d17386d56ac46bc5084fccb0be57a3413"}) 10:14:21 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) write$P9_RWRITE(r0, &(0x7f00000000c0)={0xb, 0x77, 0x2}, 0xb) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000040)={0x8, [0x3, 0x1, 0x5, 0x0, 0x9, 0x800, 0x81, 0x100, 0x3f, 0x9, 0x668e, 0x4, 0x86cd, 0x4, 0x2, 0xe40, 0x40, 0x81, 0x1, 0x3, 0x8, 0x8, 0x3, 0xfffffffffffffffe, 0x8, 0x7, 0x6, 0x100000000, 0x1, 0x6, 0x3, 0x2, 0x0, 0xfff, 0x1c000, 0x9c75, 0xfff, 0x4, 0x7, 0x1, 0x6, 0x9, 0x1, 0x7c3, 0xafc, 0xff, 0x2, 0x6], 0x3}) 10:14:21 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x1a7) 10:14:21 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f00000000c0), 0x4) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4401, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0x10001, 0xdb5a}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2002) 10:14:21 executing program 4: r0 = io_uring_setup(0xa95, &(0x7f0000000040)={0x0, 0x0, 0x1, 0x3fffffffffc}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000000)=""/63, 0x3f}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x2) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r1, 0x101, 0xb, &(0x7f0000000140), 0x4) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) getsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000040)=""/96, &(0x7f0000000100)=0x60) sendfile(r2, r0, &(0x7f00000000c0)=0x2, 0x5) [ 189.310146][T10072] WARNING: CPU: 0 PID: 10072 at include/linux/cpumask.h:121 io_uring_setup+0x1399/0x1ac0 [ 189.316509][ T3875] kobject: 'loop1' (0000000051363431): kobject_uevent_env [ 189.319981][T10072] Kernel panic - not syncing: panic_on_warn set ... [ 189.319999][T10072] CPU: 0 PID: 10072 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #94 [ 189.320007][T10072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.320012][T10072] Call Trace: [ 189.320036][T10072] dump_stack+0x172/0x1f0 [ 189.320055][T10072] ? io_uring_setup+0x12f0/0x1ac0 [ 189.320072][T10072] panic+0x2cb/0x65c [ 189.320087][T10072] ? __warn_printk+0xf3/0xf3 [ 189.320105][T10072] ? io_uring_setup+0x1399/0x1ac0 [ 189.320120][T10072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.320134][T10072] ? __warn.cold+0x5/0x45 [ 189.320152][T10072] ? io_uring_setup+0x1399/0x1ac0 [ 189.327418][ T3875] kobject: 'loop1' (0000000051363431): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.333832][T10072] __warn.cold+0x20/0x45 [ 189.333851][T10072] ? io_uring_setup+0x1399/0x1ac0 [ 189.333870][T10072] report_bug+0x263/0x2b0 [ 189.333888][T10072] do_error_trap+0x11b/0x200 [ 189.333907][T10072] do_invalid_op+0x37/0x50 [ 189.399530][ T3875] kobject: 'loop1' (0000000051363431): kobject_uevent_env [ 189.404001][T10072] ? io_uring_setup+0x1399/0x1ac0 [ 189.404019][T10072] invalid_op+0x14/0x20 [ 189.404030][T10072] RIP: 0010:io_uring_setup+0x1399/0x1ac0 [ 189.404048][T10072] Code: 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 f8 fd ff ff 4c 89 f7 e8 d1 7d e0 ff e9 eb fd ff ff e8 07 67 a8 ff <0f> 0b e9 27 f7 ff ff e8 fb 66 a8 ff 4c 89 ff e8 83 3b 7a ff e9 fd [ 189.416118][ T3875] kobject: 'loop1' (0000000051363431): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.417615][T10072] RSP: 0018:ffff888064a0fdc8 EFLAGS: 00010212 [ 189.417629][T10072] RAX: 0000000000040000 RBX: 00000000fffffffc RCX: ffffc9000e6b3000 [ 189.417638][T10072] RDX: 00000000000002f9 RSI: ffffffff81c825a9 RDI: 0000000000000005 [ 189.417648][T10072] RBP: ffff888064a0fef0 R08: ffff88806442e700 R09: ffffed101516f90c [ 189.417656][T10072] R10: ffffed101516f90b R11: ffff8880a8b7c85f R12: ffff8880644ce180 [ 189.417669][T10072] R13: ffff888064a0fec8 R14: ffff8880644ce1c0 R15: ffff8880644ce1d4 [ 189.483111][ T3875] kobject: 'loop1' (0000000051363431): kobject_uevent_env [ 189.484382][T10072] ? io_uring_setup+0x1399/0x1ac0 [ 189.496907][ T3875] kobject: 'loop1' (0000000051363431): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.500301][T10072] ? io_uring_setup+0x1399/0x1ac0 [ 189.500318][T10072] ? io_uring_release+0x50/0x50 [ 189.500332][T10072] ? nsecs_to_jiffies+0x30/0x30 [ 189.500363][T10072] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.521689][ T3875] kobject: 'loop3' (000000006c7a99e7): kobject_uevent_env [ 189.524248][T10072] ? do_syscall_64+0x26/0x610 [ 189.524262][T10072] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.524280][T10072] ? do_syscall_64+0x26/0x610 [ 189.558216][ T3875] kobject: 'loop3' (000000006c7a99e7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 189.561199][T10072] ? lockdep_hardirqs_on+0x418/0x5d0 [ 189.561219][T10072] __x64_sys_io_uring_setup+0x54/0x80 [ 189.561236][T10072] do_syscall_64+0x103/0x610 [ 189.561256][T10072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.620737][T10072] RIP: 0033:0x458da9 [ 189.624639][T10072] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.630359][ T3875] kobject: 'loop1' (0000000051363431): kobject_uevent_env [ 189.644239][T10072] RSP: 002b:00007f154a041c78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 189.644254][T10072] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000458da9 [ 189.644262][T10072] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000a95 [ 189.644269][T10072] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 189.644284][T10072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f154a0426d4 [ 189.678059][ T3875] kobject: 'loop1' (0000000051363431): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.683724][T10072] R13: 00000000004bffde R14: 00000000004d2318 R15: 00000000ffffffff [ 189.685055][T10072] Kernel Offset: disabled [ 189.715379][T10072] Rebooting in 86400 seconds..