[ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.17' (ECDSA) to the list of known hosts. 2021/01/20 13:24:19 fuzzer started 2021/01/20 13:24:20 dialing manager at 10.128.0.26:42011 2021/01/20 13:24:20 syscalls: 3464 2021/01/20 13:24:20 code coverage: enabled 2021/01/20 13:24:20 comparison tracing: enabled 2021/01/20 13:24:20 extra coverage: enabled 2021/01/20 13:24:20 setuid sandbox: enabled 2021/01/20 13:24:20 namespace sandbox: enabled 2021/01/20 13:24:20 Android sandbox: enabled 2021/01/20 13:24:20 fault injection: enabled 2021/01/20 13:24:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/01/20 13:24:20 net packet injection: enabled 2021/01/20 13:24:20 net device setup: enabled 2021/01/20 13:24:20 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/01/20 13:24:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/01/20 13:24:20 USB emulation: enabled 2021/01/20 13:24:20 hci packet injection: enabled 2021/01/20 13:24:20 wifi device emulation: enabled 2021/01/20 13:24:20 fetching corpus: 0, signal 0/2000 (executing program) 2021/01/20 13:24:20 fetching corpus: 50, signal 53016/56830 (executing program) 2021/01/20 13:24:20 fetching corpus: 100, signal 92449/97954 (executing program) 2021/01/20 13:24:20 fetching corpus: 150, signal 115382/122589 (executing program) 2021/01/20 13:24:21 fetching corpus: 200, signal 141232/150025 (executing program) 2021/01/20 13:24:21 fetching corpus: 250, signal 161378/171718 (executing program) 2021/01/20 13:24:21 fetching corpus: 300, signal 179816/191665 (executing program) 2021/01/20 13:24:21 fetching corpus: 350, signal 196062/209438 (executing program) 2021/01/20 13:24:21 fetching corpus: 400, signal 206961/221873 (executing program) 2021/01/20 13:24:22 fetching corpus: 450, signal 218310/234715 (executing program) 2021/01/20 13:24:22 fetching corpus: 500, signal 225938/243861 (executing program) 2021/01/20 13:24:22 fetching corpus: 550, signal 236581/255940 (executing program) 2021/01/20 13:24:22 fetching corpus: 600, signal 244531/265339 (executing program) 2021/01/20 13:24:22 fetching corpus: 650, signal 256849/279031 (executing program) 2021/01/20 13:24:23 fetching corpus: 700, signal 267487/290958 (executing program) 2021/01/20 13:24:23 fetching corpus: 750, signal 276896/301688 (executing program) 2021/01/20 13:24:23 fetching corpus: 800, signal 283007/309192 (executing program) 2021/01/20 13:24:23 fetching corpus: 850, signal 289255/316796 (executing program) 2021/01/20 13:24:23 fetching corpus: 900, signal 296271/325133 (executing program) 2021/01/20 13:24:24 fetching corpus: 950, signal 305953/336021 (executing program) 2021/01/20 13:24:24 fetching corpus: 1000, signal 314004/345275 (executing program) 2021/01/20 13:24:24 fetching corpus: 1050, signal 320177/352675 (executing program) 2021/01/20 13:24:24 fetching corpus: 1100, signal 326312/360072 (executing program) 2021/01/20 13:24:24 fetching corpus: 1150, signal 333080/367983 (executing program) 2021/01/20 13:24:24 fetching corpus: 1200, signal 341459/377478 (executing program) 2021/01/20 13:24:25 fetching corpus: 1250, signal 345040/382343 (executing program) 2021/01/20 13:24:25 fetching corpus: 1300, signal 349839/388314 (executing program) 2021/01/20 13:24:25 fetching corpus: 1350, signal 358020/397526 (executing program) 2021/01/20 13:24:25 fetching corpus: 1400, signal 362868/403552 (executing program) 2021/01/20 13:24:26 fetching corpus: 1450, signal 367830/409681 (executing program) 2021/01/20 13:24:26 fetching corpus: 1500, signal 376918/419743 (executing program) 2021/01/20 13:24:26 fetching corpus: 1550, signal 381884/425833 (executing program) 2021/01/20 13:24:26 fetching corpus: 1600, signal 389869/434788 (executing program) 2021/01/20 13:24:26 fetching corpus: 1650, signal 395366/441370 (executing program) 2021/01/20 13:24:27 fetching corpus: 1700, signal 400737/447809 (executing program) 2021/01/20 13:24:27 fetching corpus: 1750, signal 407355/455391 (executing program) 2021/01/20 13:24:27 fetching corpus: 1800, signal 412032/461118 (executing program) 2021/01/20 13:24:27 fetching corpus: 1850, signal 419174/469175 (executing program) 2021/01/20 13:24:28 fetching corpus: 1900, signal 425243/476199 (executing program) 2021/01/20 13:24:28 fetching corpus: 1950, signal 428675/480682 (executing program) 2021/01/20 13:24:28 fetching corpus: 2000, signal 434415/487363 (executing program) 2021/01/20 13:24:28 fetching corpus: 2050, signal 439867/493653 (executing program) 2021/01/20 13:24:29 fetching corpus: 2100, signal 445905/500563 (executing program) 2021/01/20 13:24:29 fetching corpus: 2150, signal 450133/505741 (executing program) 2021/01/20 13:24:29 fetching corpus: 2200, signal 453777/510451 (executing program) 2021/01/20 13:24:29 fetching corpus: 2250, signal 457841/515453 (executing program) 2021/01/20 13:24:30 fetching corpus: 2300, signal 462359/520858 (executing program) 2021/01/20 13:24:30 fetching corpus: 2350, signal 466652/526115 (executing program) 2021/01/20 13:24:30 fetching corpus: 2400, signal 471286/531637 (executing program) 2021/01/20 13:24:30 fetching corpus: 2450, signal 474169/535514 (executing program) 2021/01/20 13:24:30 fetching corpus: 2500, signal 476691/539036 (executing program) 2021/01/20 13:24:31 fetching corpus: 2550, signal 480296/543630 (executing program) 2021/01/20 13:24:31 fetching corpus: 2600, signal 484270/548431 (executing program) 2021/01/20 13:24:31 fetching corpus: 2650, signal 487144/552285 (executing program) 2021/01/20 13:24:31 fetching corpus: 2700, signal 490741/556767 (executing program) 2021/01/20 13:24:31 fetching corpus: 2750, signal 494645/561519 (executing program) 2021/01/20 13:24:32 fetching corpus: 2800, signal 498685/566418 (executing program) 2021/01/20 13:24:32 fetching corpus: 2850, signal 501903/570500 (executing program) 2021/01/20 13:24:32 fetching corpus: 2900, signal 505392/574848 (executing program) 2021/01/20 13:24:32 fetching corpus: 2950, signal 507812/578173 (executing program) 2021/01/20 13:24:32 fetching corpus: 3000, signal 509869/581230 (executing program) 2021/01/20 13:24:32 fetching corpus: 3050, signal 513245/585451 (executing program) 2021/01/20 13:24:33 fetching corpus: 3100, signal 516976/589957 (executing program) 2021/01/20 13:24:33 fetching corpus: 3150, signal 520526/594290 (executing program) 2021/01/20 13:24:33 fetching corpus: 3200, signal 523670/598259 (executing program) 2021/01/20 13:24:33 fetching corpus: 3250, signal 525705/601260 (executing program) 2021/01/20 13:24:33 fetching corpus: 3300, signal 528794/605191 (executing program) 2021/01/20 13:24:34 fetching corpus: 3350, signal 530938/608224 (executing program) 2021/01/20 13:24:34 fetching corpus: 3400, signal 532682/610852 (executing program) 2021/01/20 13:24:34 fetching corpus: 3450, signal 535936/614849 (executing program) 2021/01/20 13:24:34 fetching corpus: 3500, signal 539239/618884 (executing program) 2021/01/20 13:24:35 fetching corpus: 3550, signal 542241/622653 (executing program) 2021/01/20 13:24:35 fetching corpus: 3600, signal 543445/624846 (executing program) 2021/01/20 13:24:35 fetching corpus: 3650, signal 546852/628984 (executing program) 2021/01/20 13:24:35 fetching corpus: 3700, signal 549188/632184 (executing program) 2021/01/20 13:24:35 fetching corpus: 3750, signal 551728/635517 (executing program) 2021/01/20 13:24:36 fetching corpus: 3800, signal 554512/639048 (executing program) 2021/01/20 13:24:36 fetching corpus: 3850, signal 557210/642504 (executing program) 2021/01/20 13:24:36 fetching corpus: 3900, signal 560073/646072 (executing program) 2021/01/20 13:24:36 fetching corpus: 3950, signal 562738/649468 (executing program) 2021/01/20 13:24:36 fetching corpus: 4000, signal 564091/651731 (executing program) 2021/01/20 13:24:36 fetching corpus: 4050, signal 565900/654377 (executing program) 2021/01/20 13:24:37 fetching corpus: 4100, signal 568734/657889 (executing program) 2021/01/20 13:24:37 fetching corpus: 4150, signal 571225/661105 (executing program) 2021/01/20 13:24:37 fetching corpus: 4200, signal 573988/664541 (executing program) 2021/01/20 13:24:37 fetching corpus: 4250, signal 576232/667579 (executing program) 2021/01/20 13:24:37 fetching corpus: 4300, signal 578945/670990 (executing program) 2021/01/20 13:24:37 fetching corpus: 4350, signal 581354/674110 (executing program) 2021/01/20 13:24:38 fetching corpus: 4400, signal 583306/676821 (executing program) 2021/01/20 13:24:38 fetching corpus: 4450, signal 584979/679320 (executing program) 2021/01/20 13:24:38 fetching corpus: 4500, signal 587686/682709 (executing program) 2021/01/20 13:24:38 fetching corpus: 4550, signal 590232/685898 (executing program) 2021/01/20 13:24:38 fetching corpus: 4599, signal 591946/688368 (executing program) 2021/01/20 13:24:39 fetching corpus: 4649, signal 593692/690825 (executing program) 2021/01/20 13:24:39 fetching corpus: 4699, signal 595165/693138 (executing program) 2021/01/20 13:24:39 fetching corpus: 4749, signal 597375/695986 (executing program) 2021/01/20 13:24:39 fetching corpus: 4799, signal 599015/698381 (executing program) 2021/01/20 13:24:39 fetching corpus: 4849, signal 601592/701614 (executing program) 2021/01/20 13:24:39 fetching corpus: 4899, signal 603420/704154 (executing program) 2021/01/20 13:24:40 fetching corpus: 4949, signal 604438/706032 (executing program) 2021/01/20 13:24:40 fetching corpus: 4999, signal 606744/708988 (executing program) 2021/01/20 13:24:40 fetching corpus: 5049, signal 608372/711369 (executing program) 2021/01/20 13:24:40 fetching corpus: 5099, signal 610474/714109 (executing program) 2021/01/20 13:24:40 fetching corpus: 5149, signal 613124/717343 (executing program) 2021/01/20 13:24:41 fetching corpus: 5199, signal 615399/720237 (executing program) 2021/01/20 13:24:41 fetching corpus: 5249, signal 617252/722777 (executing program) 2021/01/20 13:24:41 fetching corpus: 5299, signal 619402/725539 (executing program) 2021/01/20 13:24:41 fetching corpus: 5349, signal 621149/727942 (executing program) 2021/01/20 13:24:41 fetching corpus: 5399, signal 622396/729958 (executing program) 2021/01/20 13:24:42 fetching corpus: 5449, signal 624622/732793 (executing program) 2021/01/20 13:24:42 fetching corpus: 5499, signal 626967/735659 (executing program) 2021/01/20 13:24:42 fetching corpus: 5549, signal 628243/737668 (executing program) 2021/01/20 13:24:42 fetching corpus: 5599, signal 629890/739968 (executing program) 2021/01/20 13:24:42 fetching corpus: 5649, signal 633922/744206 (executing program) 2021/01/20 13:24:42 fetching corpus: 5699, signal 635991/746856 (executing program) 2021/01/20 13:24:42 fetching corpus: 5749, signal 637854/749311 (executing program) 2021/01/20 13:24:43 fetching corpus: 5799, signal 640231/752188 (executing program) 2021/01/20 13:24:43 fetching corpus: 5849, signal 643227/755502 (executing program) 2021/01/20 13:24:43 fetching corpus: 5899, signal 646781/759352 (executing program) 2021/01/20 13:24:43 fetching corpus: 5949, signal 648631/761754 (executing program) 2021/01/20 13:24:43 fetching corpus: 5999, signal 650300/763994 (executing program) 2021/01/20 13:24:44 fetching corpus: 6049, signal 652296/766481 (executing program) 2021/01/20 13:24:44 fetching corpus: 6099, signal 654235/768989 (executing program) 2021/01/20 13:24:44 fetching corpus: 6149, signal 655767/771131 (executing program) 2021/01/20 13:24:44 fetching corpus: 6199, signal 657004/773032 (executing program) 2021/01/20 13:24:44 fetching corpus: 6249, signal 659031/775535 (executing program) 2021/01/20 13:24:45 fetching corpus: 6299, signal 660400/777523 (executing program) 2021/01/20 13:24:45 fetching corpus: 6349, signal 661413/779314 (executing program) 2021/01/20 13:24:45 fetching corpus: 6399, signal 662940/781469 (executing program) 2021/01/20 13:24:45 fetching corpus: 6449, signal 664551/783631 (executing program) 2021/01/20 13:24:45 fetching corpus: 6499, signal 668681/787826 (executing program) 2021/01/20 13:24:46 fetching corpus: 6549, signal 670741/790364 (executing program) 2021/01/20 13:24:46 fetching corpus: 6599, signal 672875/792968 (executing program) 2021/01/20 13:24:46 fetching corpus: 6649, signal 673889/794647 (executing program) 2021/01/20 13:24:46 fetching corpus: 6699, signal 676391/797481 (executing program) 2021/01/20 13:24:46 fetching corpus: 6749, signal 679605/800832 (executing program) 2021/01/20 13:24:47 fetching corpus: 6799, signal 680773/802583 (executing program) 2021/01/20 13:24:47 fetching corpus: 6849, signal 682284/804570 (executing program) 2021/01/20 13:24:47 fetching corpus: 6899, signal 683462/806372 (executing program) 2021/01/20 13:24:47 fetching corpus: 6949, signal 685442/808770 (executing program) 2021/01/20 13:24:47 fetching corpus: 6999, signal 686409/810393 (executing program) 2021/01/20 13:24:47 fetching corpus: 7049, signal 690785/814534 (executing program) 2021/01/20 13:24:48 fetching corpus: 7099, signal 692442/816661 (executing program) 2021/01/20 13:24:48 fetching corpus: 7149, signal 694475/819077 (executing program) 2021/01/20 13:24:48 fetching corpus: 7199, signal 695782/820951 (executing program) 2021/01/20 13:24:48 fetching corpus: 7249, signal 697651/823214 (executing program) 2021/01/20 13:24:49 fetching corpus: 7299, signal 699166/825235 (executing program) 2021/01/20 13:24:49 fetching corpus: 7349, signal 700415/827036 (executing program) 2021/01/20 13:24:49 fetching corpus: 7399, signal 701736/828938 (executing program) 2021/01/20 13:24:49 fetching corpus: 7449, signal 702800/830591 (executing program) 2021/01/20 13:24:49 fetching corpus: 7499, signal 704988/833114 (executing program) 2021/01/20 13:24:49 fetching corpus: 7549, signal 706252/834960 (executing program) 2021/01/20 13:24:50 fetching corpus: 7599, signal 707980/837117 (executing program) 2021/01/20 13:24:50 fetching corpus: 7649, signal 709918/839456 (executing program) 2021/01/20 13:24:50 fetching corpus: 7699, signal 711303/841307 (executing program) 2021/01/20 13:24:50 fetching corpus: 7749, signal 712184/842796 (executing program) 2021/01/20 13:24:50 fetching corpus: 7799, signal 714176/845090 (executing program) 2021/01/20 13:24:51 fetching corpus: 7849, signal 715464/846900 (executing program) 2021/01/20 13:24:51 fetching corpus: 7899, signal 717822/849505 (executing program) 2021/01/20 13:24:51 fetching corpus: 7949, signal 719488/851589 (executing program) 2021/01/20 13:24:52 fetching corpus: 7999, signal 722095/854333 (executing program) 2021/01/20 13:24:52 fetching corpus: 8049, signal 723300/856051 (executing program) 2021/01/20 13:24:52 fetching corpus: 8099, signal 724840/857971 (executing program) 2021/01/20 13:24:52 fetching corpus: 8149, signal 727065/860388 (executing program) 2021/01/20 13:24:52 fetching corpus: 8199, signal 728334/862155 (executing program) 2021/01/20 13:24:52 fetching corpus: 8249, signal 729593/863843 (executing program) 2021/01/20 13:24:53 fetching corpus: 8299, signal 730988/865690 (executing program) 2021/01/20 13:24:53 fetching corpus: 8349, signal 732161/867340 (executing program) 2021/01/20 13:24:53 fetching corpus: 8399, signal 733642/869240 (executing program) 2021/01/20 13:24:53 fetching corpus: 8449, signal 734835/870879 (executing program) 2021/01/20 13:24:53 fetching corpus: 8499, signal 736230/872655 (executing program) 2021/01/20 13:24:54 fetching corpus: 8549, signal 737688/874485 (executing program) 2021/01/20 13:24:54 fetching corpus: 8599, signal 739715/876767 (executing program) 2021/01/20 13:24:54 fetching corpus: 8649, signal 740915/878423 (executing program) 2021/01/20 13:24:54 fetching corpus: 8699, signal 742230/880164 (executing program) 2021/01/20 13:24:54 fetching corpus: 8749, signal 743848/882138 (executing program) 2021/01/20 13:24:55 fetching corpus: 8799, signal 745158/883889 (executing program) 2021/01/20 13:24:55 fetching corpus: 8849, signal 746277/885443 (executing program) 2021/01/20 13:24:55 fetching corpus: 8899, signal 747209/886893 (executing program) 2021/01/20 13:24:55 fetching corpus: 8949, signal 748215/888403 (executing program) 2021/01/20 13:24:55 fetching corpus: 8999, signal 749459/890065 (executing program) 2021/01/20 13:24:56 fetching corpus: 9049, signal 750292/891384 (executing program) 2021/01/20 13:24:56 fetching corpus: 9099, signal 751664/893125 (executing program) 2021/01/20 13:24:56 fetching corpus: 9149, signal 753066/894860 (executing program) 2021/01/20 13:24:56 fetching corpus: 9199, signal 754400/896582 (executing program) 2021/01/20 13:24:57 fetching corpus: 9249, signal 755505/898126 (executing program) 2021/01/20 13:24:57 fetching corpus: 9299, signal 756881/899852 (executing program) 2021/01/20 13:24:57 fetching corpus: 9349, signal 758136/901457 (executing program) 2021/01/20 13:24:57 fetching corpus: 9399, signal 759321/903039 (executing program) 2021/01/20 13:24:57 fetching corpus: 9449, signal 760268/904440 (executing program) 2021/01/20 13:24:57 fetching corpus: 9499, signal 761351/905938 (executing program) 2021/01/20 13:24:58 fetching corpus: 9549, signal 762500/907515 (executing program) 2021/01/20 13:24:58 fetching corpus: 9599, signal 763962/909291 (executing program) 2021/01/20 13:24:58 fetching corpus: 9649, signal 764811/910618 (executing program) 2021/01/20 13:24:58 fetching corpus: 9699, signal 765830/912047 (executing program) 2021/01/20 13:24:58 fetching corpus: 9749, signal 766662/913339 (executing program) 2021/01/20 13:24:58 fetching corpus: 9799, signal 767847/914880 (executing program) 2021/01/20 13:24:59 fetching corpus: 9849, signal 768894/916352 (executing program) 2021/01/20 13:24:59 fetching corpus: 9899, signal 770304/918034 (executing program) 2021/01/20 13:24:59 fetching corpus: 9949, signal 771319/919429 (executing program) 2021/01/20 13:24:59 fetching corpus: 9999, signal 772927/921300 (executing program) 2021/01/20 13:24:59 fetching corpus: 10049, signal 774125/922820 (executing program) 2021/01/20 13:25:00 fetching corpus: 10099, signal 775523/924437 (executing program) 2021/01/20 13:25:00 fetching corpus: 10149, signal 776769/926008 (executing program) 2021/01/20 13:25:00 fetching corpus: 10199, signal 777821/927441 (executing program) 2021/01/20 13:25:00 fetching corpus: 10249, signal 779695/929383 (executing program) 2021/01/20 13:25:00 fetching corpus: 10299, signal 780351/930522 (executing program) 2021/01/20 13:25:00 fetching corpus: 10349, signal 781877/932270 (executing program) 2021/01/20 13:25:01 fetching corpus: 10399, signal 782901/933708 (executing program) 2021/01/20 13:25:01 fetching corpus: 10449, signal 784156/935223 (executing program) 2021/01/20 13:25:01 fetching corpus: 10499, signal 785271/936669 (executing program) 2021/01/20 13:25:01 fetching corpus: 10549, signal 786335/938077 (executing program) 2021/01/20 13:25:01 fetching corpus: 10599, signal 787574/939597 (executing program) 2021/01/20 13:25:01 fetching corpus: 10649, signal 788460/940865 (executing program) 2021/01/20 13:25:02 fetching corpus: 10699, signal 789679/942398 (executing program) 2021/01/20 13:25:02 fetching corpus: 10749, signal 790968/943932 (executing program) 2021/01/20 13:25:02 fetching corpus: 10799, signal 791997/945331 (executing program) 2021/01/20 13:25:02 fetching corpus: 10849, signal 793289/946831 (executing program) 2021/01/20 13:25:02 fetching corpus: 10899, signal 794333/948251 (executing program) 2021/01/20 13:25:03 fetching corpus: 10949, signal 795355/949630 (executing program) 2021/01/20 13:25:03 fetching corpus: 10999, signal 796303/950948 (executing program) 2021/01/20 13:25:03 fetching corpus: 11049, signal 797351/952359 (executing program) 2021/01/20 13:25:03 fetching corpus: 11099, signal 798579/953805 (executing program) 2021/01/20 13:25:03 fetching corpus: 11149, signal 799575/955143 (executing program) 2021/01/20 13:25:03 fetching corpus: 11199, signal 800427/956379 (executing program) 2021/01/20 13:25:04 fetching corpus: 11249, signal 801527/957732 (executing program) 2021/01/20 13:25:04 fetching corpus: 11299, signal 802200/958852 (executing program) 2021/01/20 13:25:04 fetching corpus: 11349, signal 803068/960097 (executing program) 2021/01/20 13:25:04 fetching corpus: 11399, signal 804313/961581 (executing program) 2021/01/20 13:25:04 fetching corpus: 11449, signal 805132/962816 (executing program) 2021/01/20 13:25:05 fetching corpus: 11499, signal 806146/964134 (executing program) 2021/01/20 13:25:05 fetching corpus: 11549, signal 807184/965480 (executing program) 2021/01/20 13:25:05 fetching corpus: 11599, signal 808112/966719 (executing program) 2021/01/20 13:25:05 fetching corpus: 11649, signal 809024/967976 (executing program) 2021/01/20 13:25:05 fetching corpus: 11699, signal 809879/969184 (executing program) 2021/01/20 13:25:05 fetching corpus: 11749, signal 811349/970822 (executing program) 2021/01/20 13:25:06 fetching corpus: 11799, signal 812134/972001 (executing program) 2021/01/20 13:25:06 fetching corpus: 11849, signal 813693/973668 (executing program) 2021/01/20 13:25:06 fetching corpus: 11899, signal 814983/975157 (executing program) 2021/01/20 13:25:06 fetching corpus: 11949, signal 816241/976587 (executing program) 2021/01/20 13:25:06 fetching corpus: 11999, signal 817237/977860 (executing program) 2021/01/20 13:25:07 fetching corpus: 12049, signal 818190/979094 (executing program) 2021/01/20 13:25:07 fetching corpus: 12099, signal 819154/980294 (executing program) 2021/01/20 13:25:07 fetching corpus: 12149, signal 820327/981621 (executing program) 2021/01/20 13:25:07 fetching corpus: 12199, signal 821456/982951 (executing program) 2021/01/20 13:25:07 fetching corpus: 12249, signal 822667/984344 (executing program) 2021/01/20 13:25:08 fetching corpus: 12299, signal 823605/985584 (executing program) 2021/01/20 13:25:08 fetching corpus: 12349, signal 824871/986977 (executing program) 2021/01/20 13:25:08 fetching corpus: 12399, signal 825770/988190 (executing program) 2021/01/20 13:25:08 fetching corpus: 12449, signal 827422/989781 (executing program) 2021/01/20 13:25:09 fetching corpus: 12499, signal 828657/991190 (executing program) 2021/01/20 13:25:09 fetching corpus: 12549, signal 829938/992558 (executing program) 2021/01/20 13:25:09 fetching corpus: 12599, signal 830995/993811 (executing program) 2021/01/20 13:25:09 fetching corpus: 12649, signal 832384/995254 (executing program) 2021/01/20 13:25:09 fetching corpus: 12699, signal 833276/996419 (executing program) 2021/01/20 13:25:10 fetching corpus: 12749, signal 833977/997437 (executing program) 2021/01/20 13:25:10 fetching corpus: 12799, signal 834977/998658 (executing program) 2021/01/20 13:25:10 fetching corpus: 12849, signal 835788/999777 (executing program) 2021/01/20 13:25:10 fetching corpus: 12899, signal 836356/1000746 (executing program) 2021/01/20 13:25:10 fetching corpus: 12949, signal 837637/1002127 (executing program) 2021/01/20 13:25:11 fetching corpus: 12999, signal 838750/1003425 (executing program) 2021/01/20 13:25:11 fetching corpus: 13049, signal 839572/1004574 (executing program) 2021/01/20 13:25:11 fetching corpus: 13099, signal 840187/1005549 (executing program) 2021/01/20 13:25:11 fetching corpus: 13149, signal 841311/1006800 (executing program) 2021/01/20 13:25:11 fetching corpus: 13199, signal 841948/1007774 (executing program) 2021/01/20 13:25:12 fetching corpus: 13249, signal 842867/1008911 (executing program) 2021/01/20 13:25:12 fetching corpus: 13299, signal 843423/1009860 (executing program) 2021/01/20 13:25:12 fetching corpus: 13349, signal 844221/1010918 (executing program) 2021/01/20 13:25:12 fetching corpus: 13399, signal 844902/1011960 (executing program) 2021/01/20 13:25:12 fetching corpus: 13449, signal 845754/1013076 (executing program) 2021/01/20 13:25:13 fetching corpus: 13499, signal 847323/1014570 (executing program) 2021/01/20 13:25:13 fetching corpus: 13549, signal 847826/1015485 (executing program) 2021/01/20 13:25:13 fetching corpus: 13599, signal 849216/1016887 (executing program) 2021/01/20 13:25:13 fetching corpus: 13649, signal 850199/1018075 (executing program) 2021/01/20 13:25:13 fetching corpus: 13699, signal 850835/1019051 (executing program) 2021/01/20 13:25:13 fetching corpus: 13749, signal 851542/1020043 (executing program) 2021/01/20 13:25:14 fetching corpus: 13799, signal 852321/1021067 (executing program) 2021/01/20 13:25:14 fetching corpus: 13849, signal 853248/1022170 (executing program) 2021/01/20 13:25:14 fetching corpus: 13899, signal 854124/1023243 (executing program) 2021/01/20 13:25:14 fetching corpus: 13949, signal 855081/1024344 (executing program) 2021/01/20 13:25:14 fetching corpus: 13999, signal 855974/1025419 (executing program) 2021/01/20 13:25:15 fetching corpus: 14049, signal 856710/1026394 (executing program) 2021/01/20 13:25:15 fetching corpus: 14099, signal 857261/1027294 (executing program) 2021/01/20 13:25:15 fetching corpus: 14149, signal 858102/1028404 (executing program) 2021/01/20 13:25:15 fetching corpus: 14199, signal 858905/1029458 (executing program) 2021/01/20 13:25:15 fetching corpus: 14249, signal 859619/1030438 (executing program) 2021/01/20 13:25:15 fetching corpus: 14299, signal 860244/1031382 (executing program) 2021/01/20 13:25:16 fetching corpus: 14349, signal 861189/1032452 (executing program) 2021/01/20 13:25:16 fetching corpus: 14399, signal 862076/1033468 (executing program) 2021/01/20 13:25:16 fetching corpus: 14449, signal 863630/1034914 (executing program) 2021/01/20 13:25:16 fetching corpus: 14499, signal 864556/1036004 (executing program) 2021/01/20 13:25:17 fetching corpus: 14549, signal 865335/1036998 (executing program) 2021/01/20 13:25:17 fetching corpus: 14599, signal 866005/1037925 (executing program) 2021/01/20 13:25:17 fetching corpus: 14649, signal 866550/1038847 (executing program) 2021/01/20 13:25:17 fetching corpus: 14699, signal 867437/1039856 (executing program) 2021/01/20 13:25:17 fetching corpus: 14749, signal 868272/1040896 (executing program) 2021/01/20 13:25:18 fetching corpus: 14799, signal 868925/1041805 (executing program) 2021/01/20 13:25:18 fetching corpus: 14849, signal 869772/1042794 (executing program) 2021/01/20 13:25:18 fetching corpus: 14899, signal 870519/1043763 (executing program) 2021/01/20 13:25:18 fetching corpus: 14949, signal 871248/1044746 (executing program) 2021/01/20 13:25:18 fetching corpus: 14999, signal 872078/1045769 (executing program) 2021/01/20 13:25:19 fetching corpus: 15049, signal 872714/1046684 (executing program) 2021/01/20 13:25:19 fetching corpus: 15099, signal 873780/1047796 (executing program) 2021/01/20 13:25:19 fetching corpus: 15149, signal 874430/1048686 (executing program) 2021/01/20 13:25:19 fetching corpus: 15199, signal 875694/1049833 (executing program) 2021/01/20 13:25:19 fetching corpus: 15249, signal 876604/1050883 (executing program) 2021/01/20 13:25:20 fetching corpus: 15299, signal 877220/1051754 (executing program) 2021/01/20 13:25:20 fetching corpus: 15349, signal 877760/1052569 (executing program) 2021/01/20 13:25:20 fetching corpus: 15399, signal 879215/1053864 (executing program) 2021/01/20 13:25:20 fetching corpus: 15449, signal 880728/1055191 (executing program) 2021/01/20 13:25:21 fetching corpus: 15499, signal 881420/1056078 (executing program) 2021/01/20 13:25:21 fetching corpus: 15549, signal 882101/1056981 (executing program) 2021/01/20 13:25:21 fetching corpus: 15599, signal 882609/1057797 (executing program) 2021/01/20 13:25:21 fetching corpus: 15649, signal 883256/1058637 (executing program) 2021/01/20 13:25:21 fetching corpus: 15699, signal 884971/1060014 (executing program) 2021/01/20 13:25:22 fetching corpus: 15749, signal 886128/1061103 (executing program) 2021/01/20 13:25:22 fetching corpus: 15799, signal 886857/1062001 (executing program) 2021/01/20 13:25:22 fetching corpus: 15849, signal 887510/1062873 (executing program) 2021/01/20 13:25:22 fetching corpus: 15899, signal 888406/1063860 (executing program) 2021/01/20 13:25:23 fetching corpus: 15949, signal 889387/1064900 (executing program) 2021/01/20 13:25:23 fetching corpus: 15999, signal 890238/1065826 (executing program) 2021/01/20 13:25:23 fetching corpus: 16049, signal 890787/1066651 (executing program) 2021/01/20 13:25:23 fetching corpus: 16099, signal 891861/1067735 (executing program) 2021/01/20 13:25:24 fetching corpus: 16149, signal 892546/1068609 (executing program) 2021/01/20 13:25:24 fetching corpus: 16199, signal 893245/1069474 (executing program) 2021/01/20 13:25:24 fetching corpus: 16249, signal 894084/1070425 (executing program) 2021/01/20 13:25:24 fetching corpus: 16299, signal 895232/1071493 (executing program) 2021/01/20 13:25:24 fetching corpus: 16349, signal 895951/1072350 (executing program) 2021/01/20 13:25:24 fetching corpus: 16399, signal 897259/1073468 (executing program) 2021/01/20 13:25:25 fetching corpus: 16449, signal 898166/1074412 (executing program) 2021/01/20 13:25:25 fetching corpus: 16499, signal 899160/1075433 (executing program) 2021/01/20 13:25:25 fetching corpus: 16549, signal 899978/1076390 (executing program) 2021/01/20 13:25:25 fetching corpus: 16599, signal 900639/1077238 (executing program) 2021/01/20 13:25:25 fetching corpus: 16649, signal 901165/1077963 (executing program) 2021/01/20 13:25:26 fetching corpus: 16699, signal 902000/1078863 (executing program) 2021/01/20 13:25:26 fetching corpus: 16749, signal 902734/1079717 (executing program) 2021/01/20 13:25:26 fetching corpus: 16799, signal 903200/1080434 (executing program) 2021/01/20 13:25:26 fetching corpus: 16849, signal 903984/1081321 (executing program) 2021/01/20 13:25:26 fetching corpus: 16899, signal 905050/1082307 (executing program) 2021/01/20 13:25:27 fetching corpus: 16949, signal 905596/1083033 (executing program) 2021/01/20 13:25:27 fetching corpus: 16999, signal 906223/1083808 (executing program) 2021/01/20 13:25:27 fetching corpus: 17049, signal 906891/1084645 (executing program) 2021/01/20 13:25:27 fetching corpus: 17099, signal 907588/1085440 (executing program) 2021/01/20 13:25:28 fetching corpus: 17149, signal 908085/1086194 (executing program) 2021/01/20 13:25:28 fetching corpus: 17199, signal 908646/1086970 (executing program) 2021/01/20 13:25:28 fetching corpus: 17249, signal 909494/1087857 (executing program) 2021/01/20 13:25:28 fetching corpus: 17299, signal 910044/1088574 (executing program) 2021/01/20 13:25:28 fetching corpus: 17349, signal 911293/1089607 (executing program) 2021/01/20 13:25:29 fetching corpus: 17399, signal 912099/1090446 (executing program) 2021/01/20 13:25:29 fetching corpus: 17449, signal 912941/1091325 (executing program) 2021/01/20 13:25:29 fetching corpus: 17499, signal 913620/1092134 (executing program) 2021/01/20 13:25:29 fetching corpus: 17549, signal 915104/1093293 (executing program) 2021/01/20 13:25:29 fetching corpus: 17599, signal 915533/1093971 (executing program) 2021/01/20 13:25:29 fetching corpus: 17649, signal 916206/1094723 (executing program) 2021/01/20 13:25:30 fetching corpus: 17699, signal 916872/1095480 (executing program) 2021/01/20 13:25:30 fetching corpus: 17749, signal 917759/1096322 (executing program) 2021/01/20 13:25:30 fetching corpus: 17799, signal 918487/1097117 (executing program) 2021/01/20 13:25:30 fetching corpus: 17849, signal 919173/1097943 (executing program) 2021/01/20 13:25:30 fetching corpus: 17899, signal 919763/1098692 (executing program) 2021/01/20 13:25:31 fetching corpus: 17949, signal 920468/1099462 (executing program) 2021/01/20 13:25:31 fetching corpus: 17999, signal 921240/1100280 (executing program) 2021/01/20 13:25:31 fetching corpus: 18049, signal 922039/1101102 (executing program) 2021/01/20 13:25:31 fetching corpus: 18099, signal 923119/1102038 (executing program) 2021/01/20 13:25:31 fetching corpus: 18149, signal 923610/1102749 (executing program) 2021/01/20 13:25:31 fetching corpus: 18199, signal 924504/1103630 (executing program) 2021/01/20 13:25:32 fetching corpus: 18249, signal 925673/1104566 (executing program) 2021/01/20 13:25:32 fetching corpus: 18299, signal 926525/1105393 (executing program) 2021/01/20 13:25:32 fetching corpus: 18349, signal 927055/1106103 (executing program) 2021/01/20 13:25:32 fetching corpus: 18399, signal 928173/1106998 (executing program) 2021/01/20 13:25:33 fetching corpus: 18449, signal 928755/1107710 (executing program) 2021/01/20 13:25:33 fetching corpus: 18499, signal 929171/1108373 (executing program) 2021/01/20 13:25:33 fetching corpus: 18549, signal 930048/1109186 (executing program) 2021/01/20 13:25:33 fetching corpus: 18599, signal 930674/1109935 (executing program) 2021/01/20 13:25:33 fetching corpus: 18649, signal 931274/1110666 (executing program) 2021/01/20 13:25:34 fetching corpus: 18699, signal 931961/1111422 (executing program) 2021/01/20 13:25:34 fetching corpus: 18749, signal 932534/1112150 (executing program) 2021/01/20 13:25:34 fetching corpus: 18799, signal 933285/1112894 (executing program) 2021/01/20 13:25:34 fetching corpus: 18849, signal 933842/1113601 (executing program) 2021/01/20 13:25:34 fetching corpus: 18899, signal 934654/1114388 (executing program) 2021/01/20 13:25:35 fetching corpus: 18949, signal 935257/1115086 (executing program) 2021/01/20 13:25:35 fetching corpus: 18999, signal 935932/1115857 (executing program) 2021/01/20 13:25:35 fetching corpus: 19049, signal 936819/1116667 (executing program) 2021/01/20 13:25:35 fetching corpus: 19099, signal 937471/1117343 (executing program) 2021/01/20 13:25:35 fetching corpus: 19149, signal 938265/1118134 (executing program) 2021/01/20 13:25:36 fetching corpus: 19199, signal 939377/1119060 (executing program) 2021/01/20 13:25:36 fetching corpus: 19249, signal 940253/1119852 (executing program) 2021/01/20 13:25:36 fetching corpus: 19299, signal 940774/1120531 (executing program) 2021/01/20 13:25:36 fetching corpus: 19349, signal 941537/1121268 (executing program) 2021/01/20 13:25:36 fetching corpus: 19399, signal 943645/1122471 (executing program) 2021/01/20 13:25:37 fetching corpus: 19449, signal 944139/1123105 (executing program) 2021/01/20 13:25:37 fetching corpus: 19499, signal 944690/1123762 (executing program) 2021/01/20 13:25:37 fetching corpus: 19549, signal 945190/1124397 (executing program) 2021/01/20 13:25:37 fetching corpus: 19599, signal 946371/1125329 (executing program) 2021/01/20 13:25:38 fetching corpus: 19649, signal 946892/1125967 (executing program) 2021/01/20 13:25:38 fetching corpus: 19699, signal 947832/1126803 (executing program) 2021/01/20 13:25:38 fetching corpus: 19749, signal 948509/1127459 (executing program) 2021/01/20 13:25:38 fetching corpus: 19799, signal 948991/1128080 (executing program) 2021/01/20 13:25:38 fetching corpus: 19849, signal 949903/1128857 (executing program) 2021/01/20 13:25:39 fetching corpus: 19899, signal 950655/1129552 (executing program) 2021/01/20 13:25:39 fetching corpus: 19949, signal 951224/1130177 (executing program) 2021/01/20 13:25:39 fetching corpus: 19999, signal 951793/1130837 (executing program) 2021/01/20 13:25:40 fetching corpus: 20049, signal 952907/1131666 (executing program) 2021/01/20 13:25:40 fetching corpus: 20099, signal 953281/1132246 (executing program) 2021/01/20 13:25:40 fetching corpus: 20149, signal 953934/1132940 (executing program) 2021/01/20 13:25:40 fetching corpus: 20199, signal 954385/1133497 (executing program) 2021/01/20 13:25:40 fetching corpus: 20249, signal 955550/1134327 (executing program) 2021/01/20 13:25:41 fetching corpus: 20299, signal 956250/1135012 (executing program) 2021/01/20 13:25:41 fetching corpus: 20349, signal 956919/1135662 (executing program) 2021/01/20 13:25:41 fetching corpus: 20399, signal 957513/1136321 (executing program) 2021/01/20 13:25:41 fetching corpus: 20449, signal 958084/1136952 (executing program) 2021/01/20 13:25:41 fetching corpus: 20499, signal 958771/1137609 (executing program) 2021/01/20 13:25:42 fetching corpus: 20549, signal 959523/1138273 (executing program) 2021/01/20 13:25:42 fetching corpus: 20599, signal 960141/1138935 (executing program) 2021/01/20 13:25:42 fetching corpus: 20649, signal 960545/1139511 (executing program) 2021/01/20 13:25:42 fetching corpus: 20699, signal 961320/1140203 (executing program) 2021/01/20 13:25:42 fetching corpus: 20749, signal 962531/1141056 (executing program) 2021/01/20 13:25:43 fetching corpus: 20799, signal 963841/1141899 (executing program) 2021/01/20 13:25:43 fetching corpus: 20849, signal 964485/1142509 (executing program) 2021/01/20 13:25:43 fetching corpus: 20899, signal 965094/1143137 (executing program) 2021/01/20 13:25:43 fetching corpus: 20949, signal 965889/1143817 (executing program) 2021/01/20 13:25:43 fetching corpus: 20999, signal 966507/1144412 (executing program) 2021/01/20 13:25:44 fetching corpus: 21049, signal 967440/1145114 (executing program) 2021/01/20 13:25:44 fetching corpus: 21099, signal 967932/1145683 (executing program) 2021/01/20 13:25:44 fetching corpus: 21149, signal 968428/1146262 (executing program) 2021/01/20 13:25:44 fetching corpus: 21199, signal 969033/1146874 (executing program) 2021/01/20 13:25:44 fetching corpus: 21249, signal 970157/1147643 (executing program) 2021/01/20 13:25:45 fetching corpus: 21299, signal 971955/1148614 (executing program) 2021/01/20 13:25:45 fetching corpus: 21349, signal 972665/1149279 (executing program) 2021/01/20 13:25:45 fetching corpus: 21399, signal 973366/1149868 (executing program) 2021/01/20 13:25:45 fetching corpus: 21449, signal 974010/1150441 (executing program) 2021/01/20 13:25:45 fetching corpus: 21499, signal 974490/1150991 (executing program) 2021/01/20 13:25:46 fetching corpus: 21549, signal 975571/1151689 (executing program) 2021/01/20 13:25:46 fetching corpus: 21599, signal 976012/1152227 (executing program) 2021/01/20 13:25:46 fetching corpus: 21649, signal 976570/1152793 (executing program) 2021/01/20 13:25:46 fetching corpus: 21699, signal 977251/1153378 (executing program) 2021/01/20 13:25:46 fetching corpus: 21749, signal 977894/1153940 (executing program) 2021/01/20 13:25:47 fetching corpus: 21799, signal 978352/1154489 (executing program) 2021/01/20 13:25:47 fetching corpus: 21849, signal 978713/1154997 (executing program) 2021/01/20 13:25:47 fetching corpus: 21899, signal 979283/1155542 (executing program) 2021/01/20 13:25:47 fetching corpus: 21949, signal 979952/1156120 (executing program) 2021/01/20 13:25:47 fetching corpus: 21999, signal 980522/1156677 (executing program) 2021/01/20 13:25:48 fetching corpus: 22049, signal 981060/1157243 (executing program) 2021/01/20 13:25:48 fetching corpus: 22099, signal 981546/1157766 (executing program) 2021/01/20 13:25:48 fetching corpus: 22149, signal 981931/1158260 (executing program) 2021/01/20 13:25:48 fetching corpus: 22199, signal 982525/1158828 (executing program) 2021/01/20 13:25:48 fetching corpus: 22249, signal 983137/1159342 (executing program) 2021/01/20 13:25:48 fetching corpus: 22299, signal 983785/1159922 (executing program) 2021/01/20 13:25:49 fetching corpus: 22349, signal 984371/1160486 (executing program) 2021/01/20 13:25:49 fetching corpus: 22399, signal 984806/1160990 (executing program) 2021/01/20 13:25:49 fetching corpus: 22449, signal 985274/1161510 (executing program) 2021/01/20 13:25:49 fetching corpus: 22499, signal 985944/1162109 (executing program) 2021/01/20 13:25:49 fetching corpus: 22549, signal 986286/1162588 (executing program) 2021/01/20 13:25:50 fetching corpus: 22599, signal 986790/1163077 (executing program) 2021/01/20 13:25:50 fetching corpus: 22649, signal 987176/1163555 (executing program) 2021/01/20 13:25:50 fetching corpus: 22699, signal 987984/1164124 (executing program) 2021/01/20 13:25:50 fetching corpus: 22749, signal 988629/1164650 (executing program) 2021/01/20 13:25:50 fetching corpus: 22799, signal 989014/1165106 (executing program) 2021/01/20 13:25:50 fetching corpus: 22849, signal 990056/1165787 (executing program) 2021/01/20 13:25:51 fetching corpus: 22899, signal 990432/1166241 (executing program) 2021/01/20 13:25:51 fetching corpus: 22949, signal 991015/1166816 (executing program) 2021/01/20 13:25:51 fetching corpus: 22999, signal 991587/1167359 (executing program) 2021/01/20 13:25:51 fetching corpus: 23049, signal 992319/1167918 (executing program) 2021/01/20 13:25:51 fetching corpus: 23099, signal 992992/1168456 (executing program) 2021/01/20 13:25:52 fetching corpus: 23149, signal 993515/1168966 (executing program) 2021/01/20 13:25:52 fetching corpus: 23199, signal 994298/1169504 (executing program) 2021/01/20 13:25:52 fetching corpus: 23249, signal 994777/1169985 (executing program) 2021/01/20 13:25:52 fetching corpus: 23299, signal 995461/1170533 (executing program) 2021/01/20 13:25:52 fetching corpus: 23349, signal 995889/1171013 (executing program) 2021/01/20 13:25:53 fetching corpus: 23399, signal 996478/1171498 (executing program) 2021/01/20 13:25:53 fetching corpus: 23449, signal 996995/1171993 (executing program) 2021/01/20 13:25:53 fetching corpus: 23499, signal 997516/1172491 (executing program) 2021/01/20 13:25:53 fetching corpus: 23549, signal 998246/1173068 (executing program) 2021/01/20 13:25:53 fetching corpus: 23599, signal 999345/1173678 (executing program) 2021/01/20 13:25:54 fetching corpus: 23649, signal 1000220/1174243 (executing program) 2021/01/20 13:25:54 fetching corpus: 23699, signal 1000692/1174749 (executing program) 2021/01/20 13:25:54 fetching corpus: 23749, signal 1001136/1175206 (executing program) 2021/01/20 13:25:54 fetching corpus: 23799, signal 1001821/1175762 (executing program) 2021/01/20 13:25:54 fetching corpus: 23849, signal 1002486/1176296 (executing program) 2021/01/20 13:25:54 fetching corpus: 23899, signal 1002944/1176741 (executing program) 2021/01/20 13:25:55 fetching corpus: 23949, signal 1003729/1177298 (executing program) 2021/01/20 13:25:55 fetching corpus: 23999, signal 1004251/1177769 (executing program) 2021/01/20 13:25:55 fetching corpus: 24049, signal 1004801/1178290 (executing program) 2021/01/20 13:25:55 fetching corpus: 24099, signal 1005152/1178686 (executing program) 2021/01/20 13:25:55 fetching corpus: 24149, signal 1005485/1179127 (executing program) 2021/01/20 13:25:56 fetching corpus: 24199, signal 1006492/1179662 (executing program) 2021/01/20 13:25:56 fetching corpus: 24249, signal 1007039/1180088 (executing program) 2021/01/20 13:25:56 fetching corpus: 24299, signal 1007634/1180560 (executing program) 2021/01/20 13:25:56 fetching corpus: 24349, signal 1008279/1181076 (executing program) 2021/01/20 13:25:56 fetching corpus: 24399, signal 1009173/1181638 (executing program) 2021/01/20 13:25:56 fetching corpus: 24449, signal 1009693/1182125 (executing program) 2021/01/20 13:25:57 fetching corpus: 24499, signal 1010169/1182576 (executing program) 2021/01/20 13:25:57 fetching corpus: 24549, signal 1010633/1183019 (executing program) 2021/01/20 13:25:57 fetching corpus: 24599, signal 1011153/1183460 (executing program) 2021/01/20 13:25:57 fetching corpus: 24649, signal 1011589/1183908 (executing program) 2021/01/20 13:25:58 fetching corpus: 24699, signal 1012156/1184386 (executing program) 2021/01/20 13:25:58 fetching corpus: 24749, signal 1013717/1185072 (executing program) 2021/01/20 13:25:58 fetching corpus: 24799, signal 1014088/1185487 (executing program) 2021/01/20 13:25:58 fetching corpus: 24849, signal 1014821/1185969 (executing program) 2021/01/20 13:25:58 fetching corpus: 24899, signal 1015447/1186390 (executing program) 2021/01/20 13:25:58 fetching corpus: 24949, signal 1015939/1186820 (executing program) 2021/01/20 13:25:59 fetching corpus: 24999, signal 1016421/1187271 (executing program) 2021/01/20 13:25:59 fetching corpus: 25049, signal 1016873/1187681 (executing program) 2021/01/20 13:25:59 fetching corpus: 25099, signal 1017384/1188120 (executing program) 2021/01/20 13:25:59 fetching corpus: 25149, signal 1018043/1188600 (executing program) 2021/01/20 13:25:59 fetching corpus: 25199, signal 1018418/1189038 (executing program) 2021/01/20 13:26:00 fetching corpus: 25249, signal 1018875/1189460 (executing program) 2021/01/20 13:26:00 fetching corpus: 25299, signal 1020032/1189994 (executing program) 2021/01/20 13:26:00 fetching corpus: 25349, signal 1020521/1190366 (executing program) 2021/01/20 13:26:00 fetching corpus: 25399, signal 1020847/1190794 (executing program) 2021/01/20 13:26:00 fetching corpus: 25449, signal 1021375/1191223 (executing program) 2021/01/20 13:26:00 fetching corpus: 25499, signal 1021790/1191636 (executing program) 2021/01/20 13:26:01 fetching corpus: 25549, signal 1022249/1192056 (executing program) 2021/01/20 13:26:01 fetching corpus: 25599, signal 1022732/1192480 (executing program) 2021/01/20 13:26:01 fetching corpus: 25649, signal 1023341/1192907 (executing program) 2021/01/20 13:26:01 fetching corpus: 25699, signal 1024084/1193343 (executing program) 2021/01/20 13:26:01 fetching corpus: 25749, signal 1024487/1193743 (executing program) 2021/01/20 13:26:02 fetching corpus: 25799, signal 1024838/1194109 (executing program) 2021/01/20 13:26:02 fetching corpus: 25849, signal 1025360/1194528 (executing program) 2021/01/20 13:26:02 fetching corpus: 25899, signal 1025891/1194938 (executing program) 2021/01/20 13:26:02 fetching corpus: 25949, signal 1026475/1195334 (executing program) 2021/01/20 13:26:02 fetching corpus: 25999, signal 1027032/1195720 (executing program) 2021/01/20 13:26:03 fetching corpus: 26049, signal 1027477/1196105 (executing program) 2021/01/20 13:26:03 fetching corpus: 26099, signal 1028037/1196496 (executing program) 2021/01/20 13:26:03 fetching corpus: 26149, signal 1028852/1196934 (executing program) 2021/01/20 13:26:03 fetching corpus: 26199, signal 1029495/1197371 (executing program) 2021/01/20 13:26:04 fetching corpus: 26249, signal 1029866/1197756 (executing program) 2021/01/20 13:26:04 fetching corpus: 26299, signal 1030608/1198148 (executing program) 2021/01/20 13:26:04 fetching corpus: 26349, signal 1031106/1198514 (executing program) 2021/01/20 13:26:04 fetching corpus: 26399, signal 1031486/1198880 (executing program) 2021/01/20 13:26:04 fetching corpus: 26449, signal 1031905/1199220 (executing program) 2021/01/20 13:26:05 fetching corpus: 26499, signal 1032772/1199641 (executing program) 2021/01/20 13:26:05 fetching corpus: 26549, signal 1033514/1200054 (executing program) 2021/01/20 13:26:05 fetching corpus: 26599, signal 1034094/1200447 (executing program) 2021/01/20 13:26:05 fetching corpus: 26649, signal 1034559/1200784 (executing program) 2021/01/20 13:26:05 fetching corpus: 26699, signal 1034916/1201125 (executing program) 2021/01/20 13:26:06 fetching corpus: 26749, signal 1035543/1201535 (executing program) 2021/01/20 13:26:06 fetching corpus: 26799, signal 1036110/1201891 (executing program) 2021/01/20 13:26:06 fetching corpus: 26849, signal 1036433/1202237 (executing program) 2021/01/20 13:26:06 fetching corpus: 26899, signal 1037189/1202608 (executing program) 2021/01/20 13:26:06 fetching corpus: 26949, signal 1037640/1202968 (executing program) 2021/01/20 13:26:06 fetching corpus: 26999, signal 1038209/1203352 (executing program) 2021/01/20 13:26:07 fetching corpus: 27049, signal 1038815/1203744 (executing program) 2021/01/20 13:26:07 fetching corpus: 27099, signal 1039186/1204087 (executing program) 2021/01/20 13:26:07 fetching corpus: 27149, signal 1039738/1204432 (executing program) 2021/01/20 13:26:07 fetching corpus: 27199, signal 1040149/1204765 (executing program) 2021/01/20 13:26:07 fetching corpus: 27249, signal 1040533/1205108 (executing program) 2021/01/20 13:26:08 fetching corpus: 27299, signal 1041014/1205451 (executing program) 2021/01/20 13:26:08 fetching corpus: 27349, signal 1041562/1205813 (executing program) 2021/01/20 13:26:08 fetching corpus: 27399, signal 1041896/1206150 (executing program) 2021/01/20 13:26:08 fetching corpus: 27449, signal 1042481/1206490 (executing program) 2021/01/20 13:26:09 fetching corpus: 27499, signal 1042972/1206852 (executing program) 2021/01/20 13:26:09 fetching corpus: 27549, signal 1043408/1207196 (executing program) 2021/01/20 13:26:09 fetching corpus: 27599, signal 1043814/1207528 (executing program) 2021/01/20 13:26:09 fetching corpus: 27649, signal 1044265/1207880 (executing program) 2021/01/20 13:26:09 fetching corpus: 27699, signal 1044980/1208234 (executing program) 2021/01/20 13:26:10 fetching corpus: 27749, signal 1045366/1208575 (executing program) 2021/01/20 13:26:10 fetching corpus: 27799, signal 1045783/1208919 (executing program) 2021/01/20 13:26:10 fetching corpus: 27849, signal 1046283/1209271 (executing program) 2021/01/20 13:26:10 fetching corpus: 27899, signal 1046752/1209598 (executing program) 2021/01/20 13:26:10 fetching corpus: 27949, signal 1047107/1209922 (executing program) 2021/01/20 13:26:11 fetching corpus: 27999, signal 1047661/1210261 (executing program) 2021/01/20 13:26:11 fetching corpus: 28049, signal 1048202/1210595 (executing program) 2021/01/20 13:26:11 fetching corpus: 28099, signal 1048556/1210877 (executing program) 2021/01/20 13:26:11 fetching corpus: 28149, signal 1049955/1211277 (executing program) 2021/01/20 13:26:11 fetching corpus: 28199, signal 1050999/1211645 (executing program) 2021/01/20 13:26:12 fetching corpus: 28249, signal 1051379/1211942 (executing program) 2021/01/20 13:26:12 fetching corpus: 28299, signal 1051726/1212267 (executing program) 2021/01/20 13:26:12 fetching corpus: 28349, signal 1052237/1212612 (executing program) 2021/01/20 13:26:12 fetching corpus: 28399, signal 1052603/1212899 (executing program) 2021/01/20 13:26:12 fetching corpus: 28449, signal 1052960/1213231 (executing program) 2021/01/20 13:26:12 fetching corpus: 28499, signal 1053363/1213532 (executing program) 2021/01/20 13:26:13 fetching corpus: 28549, signal 1053883/1213830 (executing program) 2021/01/20 13:26:13 fetching corpus: 28599, signal 1054298/1214147 (executing program) 2021/01/20 13:26:13 fetching corpus: 28649, signal 1054948/1214446 (executing program) 2021/01/20 13:26:13 fetching corpus: 28699, signal 1055748/1214762 (executing program) 2021/01/20 13:26:13 fetching corpus: 28749, signal 1055985/1215050 (executing program) 2021/01/20 13:26:14 fetching corpus: 28799, signal 1056507/1215351 (executing program) 2021/01/20 13:26:14 fetching corpus: 28849, signal 1056908/1215672 (executing program) 2021/01/20 13:26:14 fetching corpus: 28899, signal 1057301/1215948 (executing program) 2021/01/20 13:26:14 fetching corpus: 28949, signal 1057829/1216288 (executing program) 2021/01/20 13:26:14 fetching corpus: 28999, signal 1058815/1216592 (executing program) 2021/01/20 13:26:14 fetching corpus: 29049, signal 1059309/1216922 (executing program) 2021/01/20 13:26:15 fetching corpus: 29099, signal 1060000/1217182 (executing program) 2021/01/20 13:26:15 fetching corpus: 29149, signal 1060527/1217497 (executing program) 2021/01/20 13:26:15 fetching corpus: 29199, signal 1060998/1217786 (executing program) 2021/01/20 13:26:15 fetching corpus: 29249, signal 1061548/1218092 (executing program) 2021/01/20 13:26:16 fetching corpus: 29299, signal 1062026/1218371 (executing program) 2021/01/20 13:26:16 fetching corpus: 29349, signal 1062413/1218669 (executing program) 2021/01/20 13:26:16 fetching corpus: 29399, signal 1062712/1218963 (executing program) 2021/01/20 13:26:16 fetching corpus: 29449, signal 1063400/1219268 (executing program) 2021/01/20 13:26:16 fetching corpus: 29499, signal 1063845/1219538 (executing program) 2021/01/20 13:26:16 fetching corpus: 29549, signal 1064231/1219805 (executing program) 2021/01/20 13:26:17 fetching corpus: 29599, signal 1064848/1220074 (executing program) 2021/01/20 13:26:17 fetching corpus: 29649, signal 1065207/1220330 (executing program) 2021/01/20 13:26:17 fetching corpus: 29699, signal 1065645/1220619 (executing program) 2021/01/20 13:26:17 fetching corpus: 29749, signal 1066269/1220844 (executing program) 2021/01/20 13:26:17 fetching corpus: 29799, signal 1066691/1221097 (executing program) 2021/01/20 13:26:17 fetching corpus: 29849, signal 1067139/1221376 (executing program) 2021/01/20 13:26:18 fetching corpus: 29899, signal 1067525/1221632 (executing program) 2021/01/20 13:26:18 fetching corpus: 29949, signal 1067901/1221881 (executing program) 2021/01/20 13:26:18 fetching corpus: 29999, signal 1068345/1222159 (executing program) 2021/01/20 13:26:18 fetching corpus: 30049, signal 1068688/1222408 (executing program) 2021/01/20 13:26:18 fetching corpus: 30099, signal 1069032/1222665 (executing program) 2021/01/20 13:26:19 fetching corpus: 30149, signal 1069368/1222914 (executing program) 2021/01/20 13:26:19 fetching corpus: 30199, signal 1070049/1223164 (executing program) 2021/01/20 13:26:19 fetching corpus: 30249, signal 1070440/1223430 (executing program) 2021/01/20 13:26:19 fetching corpus: 30299, signal 1070827/1223701 (executing program) 2021/01/20 13:26:19 fetching corpus: 30349, signal 1071237/1223957 (executing program) 2021/01/20 13:26:19 fetching corpus: 30399, signal 1071546/1224231 (executing program) 2021/01/20 13:26:20 fetching corpus: 30449, signal 1071987/1224456 (executing program) 2021/01/20 13:26:20 fetching corpus: 30499, signal 1072519/1224700 (executing program) 2021/01/20 13:26:20 fetching corpus: 30549, signal 1072910/1224959 (executing program) 2021/01/20 13:26:20 fetching corpus: 30599, signal 1073530/1225082 (executing program) 2021/01/20 13:26:20 fetching corpus: 30649, signal 1073949/1225082 (executing program) 2021/01/20 13:26:21 fetching corpus: 30699, signal 1074661/1225082 (executing program) 2021/01/20 13:26:21 fetching corpus: 30749, signal 1075092/1225083 (executing program) 2021/01/20 13:26:21 fetching corpus: 30799, signal 1075685/1225083 (executing program) 2021/01/20 13:26:21 fetching corpus: 30849, signal 1076539/1225083 (executing program) 2021/01/20 13:26:21 fetching corpus: 30899, signal 1076877/1225083 (executing program) 2021/01/20 13:26:21 fetching corpus: 30949, signal 1077218/1225083 (executing program) 2021/01/20 13:26:22 fetching corpus: 30999, signal 1077589/1225083 (executing program) 2021/01/20 13:26:22 fetching corpus: 31049, signal 1077958/1225083 (executing program) 2021/01/20 13:26:22 fetching corpus: 31099, signal 1078295/1225083 (executing program) 2021/01/20 13:26:22 fetching corpus: 31149, signal 1078470/1225083 (executing program) 2021/01/20 13:26:23 fetching corpus: 31199, signal 1078958/1225083 (executing program) 2021/01/20 13:26:23 fetching corpus: 31249, signal 1079412/1225083 (executing program) 2021/01/20 13:26:23 fetching corpus: 31299, signal 1079685/1225083 (executing program) 2021/01/20 13:26:23 fetching corpus: 31349, signal 1080112/1225083 (executing program) 2021/01/20 13:26:23 fetching corpus: 31399, signal 1080615/1225083 (executing program) 2021/01/20 13:26:23 fetching corpus: 31449, signal 1081207/1225083 (executing program) 2021/01/20 13:26:24 fetching corpus: 31499, signal 1081546/1225083 (executing program) 2021/01/20 13:26:24 fetching corpus: 31549, signal 1081942/1225085 (executing program) 2021/01/20 13:26:24 fetching corpus: 31599, signal 1082423/1225085 (executing program) 2021/01/20 13:26:24 fetching corpus: 31649, signal 1082793/1225085 (executing program) 2021/01/20 13:26:25 fetching corpus: 31699, signal 1083138/1225085 (executing program) 2021/01/20 13:26:25 fetching corpus: 31749, signal 1083552/1225085 (executing program) 2021/01/20 13:26:25 fetching corpus: 31799, signal 1084033/1225085 (executing program) 2021/01/20 13:26:25 fetching corpus: 31849, signal 1085024/1225085 (executing program) 2021/01/20 13:26:25 fetching corpus: 31899, signal 1085524/1225085 (executing program) 2021/01/20 13:26:25 fetching corpus: 31949, signal 1086102/1225085 (executing program) 2021/01/20 13:26:26 fetching corpus: 31999, signal 1086396/1225085 (executing program) 2021/01/20 13:26:26 fetching corpus: 32049, signal 1086966/1225085 (executing program) 2021/01/20 13:26:26 fetching corpus: 32099, signal 1087639/1225085 (executing program) 2021/01/20 13:26:26 fetching corpus: 32149, signal 1088081/1225085 (executing program) 2021/01/20 13:26:26 fetching corpus: 32199, signal 1088803/1225085 (executing program) 2021/01/20 13:26:27 fetching corpus: 32249, signal 1089114/1225085 (executing program) 2021/01/20 13:26:27 fetching corpus: 32299, signal 1089653/1225085 (executing program) 2021/01/20 13:26:27 fetching corpus: 32349, signal 1090123/1225085 (executing program) 2021/01/20 13:26:27 fetching corpus: 32399, signal 1090450/1225085 (executing program) 2021/01/20 13:26:27 fetching corpus: 32449, signal 1090834/1225085 (executing program) 2021/01/20 13:26:28 fetching corpus: 32499, signal 1091313/1225086 (executing program) 2021/01/20 13:26:28 fetching corpus: 32549, signal 1092125/1225086 (executing program) 2021/01/20 13:26:28 fetching corpus: 32599, signal 1092561/1225086 (executing program) 2021/01/20 13:26:28 fetching corpus: 32649, signal 1093023/1225086 (executing program) 2021/01/20 13:26:28 fetching corpus: 32699, signal 1093339/1225086 (executing program) 2021/01/20 13:26:28 fetching corpus: 32749, signal 1093844/1225088 (executing program) 2021/01/20 13:26:29 fetching corpus: 32799, signal 1094332/1225088 (executing program) 2021/01/20 13:26:29 fetching corpus: 32849, signal 1094679/1225088 (executing program) 2021/01/20 13:26:29 fetching corpus: 32899, signal 1095305/1225088 (executing program) 2021/01/20 13:26:29 fetching corpus: 32949, signal 1095896/1225088 (executing program) 2021/01/20 13:26:30 fetching corpus: 32999, signal 1096163/1225088 (executing program) 2021/01/20 13:26:30 fetching corpus: 33049, signal 1096745/1225088 (executing program) 2021/01/20 13:26:30 fetching corpus: 33099, signal 1097116/1225088 (executing program) 2021/01/20 13:26:30 fetching corpus: 33149, signal 1097751/1225088 (executing program) 2021/01/20 13:26:31 fetching corpus: 33199, signal 1098480/1225088 (executing program) 2021/01/20 13:26:31 fetching corpus: 33249, signal 1098965/1225088 (executing program) 2021/01/20 13:26:31 fetching corpus: 33299, signal 1099323/1225088 (executing program) 2021/01/20 13:26:31 fetching corpus: 33349, signal 1099606/1225088 (executing program) 2021/01/20 13:26:31 fetching corpus: 33399, signal 1099982/1225088 (executing program) 2021/01/20 13:26:32 fetching corpus: 33449, signal 1100401/1225088 (executing program) 2021/01/20 13:26:32 fetching corpus: 33499, signal 1100740/1225088 (executing program) 2021/01/20 13:26:32 fetching corpus: 33549, signal 1101135/1225088 (executing program) 2021/01/20 13:26:32 fetching corpus: 33599, signal 1101664/1225088 (executing program) 2021/01/20 13:26:32 fetching corpus: 33649, signal 1101991/1225088 (executing program) 2021/01/20 13:26:32 fetching corpus: 33699, signal 1102326/1225088 (executing program) 2021/01/20 13:26:33 fetching corpus: 33749, signal 1102604/1225088 (executing program) 2021/01/20 13:26:33 fetching corpus: 33799, signal 1103119/1225088 (executing program) 2021/01/20 13:26:33 fetching corpus: 33849, signal 1103379/1225088 (executing program) 2021/01/20 13:26:33 fetching corpus: 33899, signal 1103778/1225088 (executing program) 2021/01/20 13:26:34 fetching corpus: 33949, signal 1104200/1225088 (executing program) 2021/01/20 13:26:34 fetching corpus: 33999, signal 1104494/1225088 (executing program) 2021/01/20 13:26:34 fetching corpus: 34049, signal 1105296/1225088 (executing program) 2021/01/20 13:26:34 fetching corpus: 34099, signal 1105859/1225088 (executing program) 2021/01/20 13:26:34 fetching corpus: 34149, signal 1106136/1225088 (executing program) 2021/01/20 13:26:34 fetching corpus: 34199, signal 1106615/1225088 (executing program) 2021/01/20 13:26:35 fetching corpus: 34249, signal 1106903/1225088 (executing program) 2021/01/20 13:26:35 fetching corpus: 34299, signal 1107400/1225088 (executing program) 2021/01/20 13:26:35 fetching corpus: 34349, signal 1108123/1225088 (executing program) 2021/01/20 13:26:35 fetching corpus: 34399, signal 1108505/1225088 (executing program) 2021/01/20 13:26:35 fetching corpus: 34449, signal 1108799/1225088 (executing program) 2021/01/20 13:26:35 fetching corpus: 34499, signal 1109169/1225088 (executing program) 2021/01/20 13:26:36 fetching corpus: 34549, signal 1109515/1225088 (executing program) 2021/01/20 13:26:36 fetching corpus: 34599, signal 1110145/1225088 (executing program) 2021/01/20 13:26:36 fetching corpus: 34649, signal 1110438/1225088 (executing program) 2021/01/20 13:26:36 fetching corpus: 34699, signal 1110858/1225089 (executing program) 2021/01/20 13:26:36 fetching corpus: 34749, signal 1111216/1225089 (executing program) 2021/01/20 13:26:37 fetching corpus: 34799, signal 1111514/1225089 (executing program) 2021/01/20 13:26:37 fetching corpus: 34849, signal 1111969/1225089 (executing program) 2021/01/20 13:26:37 fetching corpus: 34899, signal 1112192/1225089 (executing program) 2021/01/20 13:26:37 fetching corpus: 34949, signal 1112625/1225089 (executing program) 2021/01/20 13:26:37 fetching corpus: 34999, signal 1112963/1225089 (executing program) 2021/01/20 13:26:38 fetching corpus: 35049, signal 1113767/1225089 (executing program) 2021/01/20 13:26:38 fetching corpus: 35099, signal 1114484/1225089 (executing program) 2021/01/20 13:26:38 fetching corpus: 35149, signal 1114842/1225089 (executing program) 2021/01/20 13:26:38 fetching corpus: 35199, signal 1115303/1225089 (executing program) 2021/01/20 13:26:38 fetching corpus: 35249, signal 1115704/1225089 (executing program) 2021/01/20 13:26:39 fetching corpus: 35299, signal 1116147/1225089 (executing program) 2021/01/20 13:26:39 fetching corpus: 35349, signal 1116626/1225089 (executing program) 2021/01/20 13:26:39 fetching corpus: 35399, signal 1116962/1225089 (executing program) 2021/01/20 13:26:39 fetching corpus: 35449, signal 1117415/1225089 (executing program) 2021/01/20 13:26:39 fetching corpus: 35499, signal 1118409/1225089 (executing program) 2021/01/20 13:26:39 fetching corpus: 35549, signal 1118786/1225089 (executing program) 2021/01/20 13:26:40 fetching corpus: 35599, signal 1119138/1225089 (executing program) 2021/01/20 13:26:40 fetching corpus: 35649, signal 1119389/1225089 (executing program) 2021/01/20 13:26:40 fetching corpus: 35699, signal 1119837/1225089 (executing program) 2021/01/20 13:26:40 fetching corpus: 35749, signal 1120135/1225089 (executing program) 2021/01/20 13:26:40 fetching corpus: 35799, signal 1120434/1225089 (executing program) 2021/01/20 13:26:40 fetching corpus: 35849, signal 1120715/1225089 (executing program) 2021/01/20 13:26:40 fetching corpus: 35899, signal 1121171/1225089 (executing program) 2021/01/20 13:26:41 fetching corpus: 35949, signal 1121490/1225089 (executing program) 2021/01/20 13:26:41 fetching corpus: 35999, signal 1121863/1225089 (executing program) 2021/01/20 13:26:41 fetching corpus: 36049, signal 1122453/1225089 (executing program) 2021/01/20 13:26:41 fetching corpus: 36099, signal 1122944/1225089 (executing program) 2021/01/20 13:26:41 fetching corpus: 36149, signal 1123312/1225089 (executing program) 2021/01/20 13:26:42 fetching corpus: 36199, signal 1123770/1225089 (executing program) 2021/01/20 13:26:42 fetching corpus: 36249, signal 1124090/1225089 (executing program) 2021/01/20 13:26:42 fetching corpus: 36299, signal 1124515/1225090 (executing program) 2021/01/20 13:26:42 fetching corpus: 36349, signal 1124893/1225090 (executing program) 2021/01/20 13:26:42 fetching corpus: 36399, signal 1125178/1225090 (executing program) 2021/01/20 13:26:43 fetching corpus: 36449, signal 1125589/1225090 (executing program) 2021/01/20 13:26:43 fetching corpus: 36499, signal 1125974/1225090 (executing program) 2021/01/20 13:26:43 fetching corpus: 36549, signal 1126221/1225090 (executing program) 2021/01/20 13:26:43 fetching corpus: 36599, signal 1126592/1225090 (executing program) 2021/01/20 13:26:43 fetching corpus: 36649, signal 1126887/1225090 (executing program) 2021/01/20 13:26:44 fetching corpus: 36699, signal 1128685/1225090 (executing program) 2021/01/20 13:26:44 fetching corpus: 36749, signal 1128998/1225090 (executing program) 2021/01/20 13:26:44 fetching corpus: 36799, signal 1129354/1225090 (executing program) 2021/01/20 13:26:44 fetching corpus: 36849, signal 1129574/1225090 (executing program) 2021/01/20 13:26:44 fetching corpus: 36899, signal 1129864/1225090 (executing program) 2021/01/20 13:26:45 fetching corpus: 36949, signal 1130217/1225094 (executing program) 2021/01/20 13:26:45 fetching corpus: 36999, signal 1130608/1225095 (executing program) 2021/01/20 13:26:45 fetching corpus: 37049, signal 1131147/1225095 (executing program) 2021/01/20 13:26:45 fetching corpus: 37099, signal 1131613/1225095 (executing program) 2021/01/20 13:26:46 fetching corpus: 37149, signal 1132048/1225095 (executing program) 2021/01/20 13:26:46 fetching corpus: 37199, signal 1132487/1225095 (executing program) 2021/01/20 13:26:46 fetching corpus: 37249, signal 1132888/1225095 (executing program) 2021/01/20 13:26:46 fetching corpus: 37299, signal 1133274/1225095 (executing program) 2021/01/20 13:26:46 fetching corpus: 37349, signal 1133642/1225097 (executing program) 2021/01/20 13:26:47 fetching corpus: 37399, signal 1133943/1225097 (executing program) 2021/01/20 13:26:47 fetching corpus: 37449, signal 1134482/1225097 (executing program) 2021/01/20 13:26:47 fetching corpus: 37499, signal 1134941/1225098 (executing program) 2021/01/20 13:26:47 fetching corpus: 37549, signal 1135255/1225098 (executing program) 2021/01/20 13:26:48 fetching corpus: 37599, signal 1135692/1225098 (executing program) 2021/01/20 13:26:48 fetching corpus: 37649, signal 1136001/1225098 (executing program) 2021/01/20 13:26:48 fetching corpus: 37699, signal 1136357/1225098 (executing program) 2021/01/20 13:26:48 fetching corpus: 37749, signal 1136726/1225118 (executing program) 2021/01/20 13:26:48 fetching corpus: 37799, signal 1137114/1225118 (executing program) 2021/01/20 13:26:49 fetching corpus: 37849, signal 1137397/1225118 (executing program) 2021/01/20 13:26:49 fetching corpus: 37899, signal 1137699/1225121 (executing program) 2021/01/20 13:26:49 fetching corpus: 37949, signal 1137957/1225121 (executing program) 2021/01/20 13:26:49 fetching corpus: 37999, signal 1138340/1225123 (executing program) 2021/01/20 13:26:49 fetching corpus: 38049, signal 1138677/1225123 (executing program) 2021/01/20 13:26:49 fetching corpus: 38099, signal 1139178/1225123 (executing program) 2021/01/20 13:26:50 fetching corpus: 38149, signal 1140298/1225123 (executing program) 2021/01/20 13:26:50 fetching corpus: 38199, signal 1140689/1225123 (executing program) 2021/01/20 13:26:50 fetching corpus: 38249, signal 1141123/1225123 (executing program) 2021/01/20 13:26:50 fetching corpus: 38299, signal 1141385/1225123 (executing program) 2021/01/20 13:26:50 fetching corpus: 38349, signal 1141685/1225123 (executing program) 2021/01/20 13:26:51 fetching corpus: 38399, signal 1142075/1225123 (executing program) 2021/01/20 13:26:51 fetching corpus: 38449, signal 1142341/1225123 (executing program) 2021/01/20 13:26:51 fetching corpus: 38499, signal 1142730/1225123 (executing program) 2021/01/20 13:26:51 fetching corpus: 38549, signal 1143196/1225123 (executing program) 2021/01/20 13:26:51 fetching corpus: 38599, signal 1143940/1225124 (executing program) 2021/01/20 13:26:52 fetching corpus: 38649, signal 1144253/1225124 (executing program) 2021/01/20 13:26:52 fetching corpus: 38699, signal 1144529/1225124 (executing program) 2021/01/20 13:26:52 fetching corpus: 38749, signal 1144889/1225124 (executing program) 2021/01/20 13:26:52 fetching corpus: 38799, signal 1145177/1225124 (executing program) 2021/01/20 13:26:53 fetching corpus: 38849, signal 1145733/1225124 (executing program) 2021/01/20 13:26:53 fetching corpus: 38899, signal 1146135/1225124 (executing program) 2021/01/20 13:26:53 fetching corpus: 38949, signal 1146335/1225124 (executing program) 2021/01/20 13:26:53 fetching corpus: 38999, signal 1146632/1225124 (executing program) 2021/01/20 13:26:53 fetching corpus: 39049, signal 1146945/1225124 (executing program) 2021/01/20 13:26:54 fetching corpus: 39099, signal 1147295/1225124 (executing program) 2021/01/20 13:26:54 fetching corpus: 39149, signal 1147609/1225126 (executing program) 2021/01/20 13:26:54 fetching corpus: 39199, signal 1147943/1225126 (executing program) 2021/01/20 13:26:54 fetching corpus: 39249, signal 1148252/1225126 (executing program) 2021/01/20 13:26:55 fetching corpus: 39299, signal 1148567/1225126 (executing program) 2021/01/20 13:26:55 fetching corpus: 39349, signal 1148803/1225126 (executing program) 2021/01/20 13:26:55 fetching corpus: 39399, signal 1149118/1225126 (executing program) 2021/01/20 13:26:55 fetching corpus: 39449, signal 1149454/1225126 (executing program) 2021/01/20 13:26:55 fetching corpus: 39499, signal 1149930/1225126 (executing program) 2021/01/20 13:26:55 fetching corpus: 39549, signal 1150536/1225128 (executing program) 2021/01/20 13:26:56 fetching corpus: 39599, signal 1151329/1225128 (executing program) 2021/01/20 13:26:56 fetching corpus: 39649, signal 1151614/1225128 (executing program) 2021/01/20 13:26:56 fetching corpus: 39699, signal 1152063/1225128 (executing program) 2021/01/20 13:26:56 fetching corpus: 39749, signal 1152320/1225128 (executing program) 2021/01/20 13:26:56 fetching corpus: 39799, signal 1152619/1225128 (executing program) 2021/01/20 13:26:57 fetching corpus: 39849, signal 1152804/1225141 (executing program) 2021/01/20 13:26:57 fetching corpus: 39899, signal 1153159/1225141 (executing program) 2021/01/20 13:26:57 fetching corpus: 39949, signal 1153411/1225141 (executing program) 2021/01/20 13:26:57 fetching corpus: 39999, signal 1153764/1225141 (executing program) 2021/01/20 13:26:57 fetching corpus: 40049, signal 1154115/1225141 (executing program) 2021/01/20 13:26:58 fetching corpus: 40099, signal 1154498/1225141 (executing program) 2021/01/20 13:26:58 fetching corpus: 40149, signal 1154869/1225142 (executing program) 2021/01/20 13:26:58 fetching corpus: 40199, signal 1155366/1225142 (executing program) 2021/01/20 13:26:58 fetching corpus: 40249, signal 1155604/1225145 (executing program) 2021/01/20 13:26:58 fetching corpus: 40299, signal 1155926/1225146 (executing program) 2021/01/20 13:26:59 fetching corpus: 40349, signal 1156332/1225146 (executing program) 2021/01/20 13:26:59 fetching corpus: 40399, signal 1156555/1225146 (executing program) 2021/01/20 13:26:59 fetching corpus: 40449, signal 1157087/1225146 (executing program) 2021/01/20 13:26:59 fetching corpus: 40499, signal 1157459/1225148 (executing program) 2021/01/20 13:26:59 fetching corpus: 40549, signal 1157818/1225148 (executing program) 2021/01/20 13:27:00 fetching corpus: 40599, signal 1158140/1225148 (executing program) 2021/01/20 13:27:00 fetching corpus: 40649, signal 1158678/1225148 (executing program) 2021/01/20 13:27:00 fetching corpus: 40699, signal 1159305/1225167 (executing program) 2021/01/20 13:27:00 fetching corpus: 40749, signal 1159726/1225176 (executing program) 2021/01/20 13:27:00 fetching corpus: 40799, signal 1160139/1225176 (executing program) 2021/01/20 13:27:01 fetching corpus: 40849, signal 1160370/1225176 (executing program) 2021/01/20 13:27:01 fetching corpus: 40899, signal 1160823/1225176 (executing program) 2021/01/20 13:27:01 fetching corpus: 40949, signal 1161127/1225176 (executing program) 2021/01/20 13:27:01 fetching corpus: 40999, signal 1161596/1225176 (executing program) 2021/01/20 13:27:01 fetching corpus: 41049, signal 1161934/1225176 (executing program) 2021/01/20 13:27:02 fetching corpus: 41099, signal 1162432/1225176 (executing program) 2021/01/20 13:27:02 fetching corpus: 41149, signal 1162654/1225176 (executing program) 2021/01/20 13:27:02 fetching corpus: 41199, signal 1163105/1225176 (executing program) 2021/01/20 13:27:02 fetching corpus: 41249, signal 1163393/1225176 (executing program) 2021/01/20 13:27:02 fetching corpus: 41299, signal 1163662/1225176 (executing program) 2021/01/20 13:27:02 fetching corpus: 41349, signal 1163986/1225176 (executing program) 2021/01/20 13:27:03 fetching corpus: 41399, signal 1164402/1225176 (executing program) 2021/01/20 13:27:03 fetching corpus: 41449, signal 1164702/1225181 (executing program) 2021/01/20 13:27:03 fetching corpus: 41499, signal 1164981/1225181 (executing program) 2021/01/20 13:27:03 fetching corpus: 41549, signal 1165484/1225181 (executing program) 2021/01/20 13:27:03 fetching corpus: 41599, signal 1165751/1225181 (executing program) 2021/01/20 13:27:03 fetching corpus: 41649, signal 1166078/1225181 (executing program) 2021/01/20 13:27:04 fetching corpus: 41699, signal 1166469/1225181 (executing program) 2021/01/20 13:27:04 fetching corpus: 41749, signal 1166927/1225181 (executing program) 2021/01/20 13:27:04 fetching corpus: 41799, signal 1167268/1225198 (executing program) 2021/01/20 13:27:04 fetching corpus: 41849, signal 1167503/1225198 (executing program) 2021/01/20 13:27:04 fetching corpus: 41899, signal 1168087/1225198 (executing program) 2021/01/20 13:27:04 fetching corpus: 41949, signal 1168484/1225198 (executing program) 2021/01/20 13:27:05 fetching corpus: 41999, signal 1168850/1225220 (executing program) 2021/01/20 13:27:05 fetching corpus: 42049, signal 1169121/1225220 (executing program) 2021/01/20 13:27:05 fetching corpus: 42099, signal 1169402/1225220 (executing program) 2021/01/20 13:27:05 fetching corpus: 42148, signal 1169678/1225230 (executing program) 2021/01/20 13:27:05 fetching corpus: 42198, signal 1170048/1225231 (executing program) 2021/01/20 13:27:06 fetching corpus: 42248, signal 1170488/1225232 (executing program) 2021/01/20 13:27:06 fetching corpus: 42298, signal 1170704/1225232 (executing program) 2021/01/20 13:27:06 fetching corpus: 42348, signal 1171084/1225233 (executing program) 2021/01/20 13:27:06 fetching corpus: 42398, signal 1171440/1225233 (executing program) 2021/01/20 13:27:06 fetching corpus: 42448, signal 1171702/1225234 (executing program) 2021/01/20 13:27:07 fetching corpus: 42498, signal 1172298/1225236 (executing program) 2021/01/20 13:27:07 fetching corpus: 42548, signal 1172561/1225236 (executing program) 2021/01/20 13:27:07 fetching corpus: 42598, signal 1172761/1225237 (executing program) 2021/01/20 13:27:07 fetching corpus: 42648, signal 1173023/1225237 (executing program) 2021/01/20 13:27:07 fetching corpus: 42698, signal 1173318/1225243 (executing program) 2021/01/20 13:27:08 fetching corpus: 42748, signal 1173575/1225243 (executing program) 2021/01/20 13:27:08 fetching corpus: 42798, signal 1173796/1225249 (executing program) 2021/01/20 13:27:08 fetching corpus: 42848, signal 1174428/1225249 (executing program) 2021/01/20 13:27:08 fetching corpus: 42898, signal 1175026/1225250 (executing program) 2021/01/20 13:27:08 fetching corpus: 42948, signal 1175375/1225251 (executing program) 2021/01/20 13:27:09 fetching corpus: 42998, signal 1175752/1225251 (executing program) 2021/01/20 13:27:09 fetching corpus: 43048, signal 1175999/1225251 (executing program) 2021/01/20 13:27:09 fetching corpus: 43098, signal 1176240/1225253 (executing program) 2021/01/20 13:27:10 fetching corpus: 43148, signal 1176733/1225254 (executing program) 2021/01/20 13:27:10 fetching corpus: 43198, signal 1177035/1225267 (executing program) 2021/01/20 13:27:10 fetching corpus: 43248, signal 1177448/1225267 (executing program) 2021/01/20 13:27:10 fetching corpus: 43298, signal 1177678/1225267 (executing program) 2021/01/20 13:27:11 fetching corpus: 43348, signal 1177917/1225270 (executing program) 2021/01/20 13:27:11 fetching corpus: 43398, signal 1178242/1225270 (executing program) 2021/01/20 13:27:11 fetching corpus: 43448, signal 1178556/1225270 (executing program) 2021/01/20 13:27:11 fetching corpus: 43498, signal 1178998/1225272 (executing program) 2021/01/20 13:27:11 fetching corpus: 43548, signal 1179444/1225272 (executing program) 2021/01/20 13:27:12 fetching corpus: 43598, signal 1179716/1225291 (executing program) 2021/01/20 13:27:12 fetching corpus: 43648, signal 1179971/1225291 (executing program) 2021/01/20 13:27:12 fetching corpus: 43698, signal 1180238/1225293 (executing program) 2021/01/20 13:27:12 fetching corpus: 43748, signal 1180602/1225293 (executing program) 2021/01/20 13:27:12 fetching corpus: 43798, signal 1180856/1225293 (executing program) 2021/01/20 13:27:13 fetching corpus: 43848, signal 1181301/1225293 (executing program) 2021/01/20 13:27:13 fetching corpus: 43898, signal 1181630/1225293 (executing program) 2021/01/20 13:27:13 fetching corpus: 43948, signal 1181912/1225295 (executing program) 2021/01/20 13:27:13 fetching corpus: 43998, signal 1182221/1225295 (executing program) 2021/01/20 13:27:13 fetching corpus: 44048, signal 1182647/1225295 (executing program) 2021/01/20 13:27:14 fetching corpus: 44098, signal 1183014/1225295 (executing program) 2021/01/20 13:27:14 fetching corpus: 44148, signal 1183354/1225295 (executing program) 2021/01/20 13:27:14 fetching corpus: 44198, signal 1183545/1225295 (executing program) 2021/01/20 13:27:14 fetching corpus: 44248, signal 1183945/1225295 (executing program) 2021/01/20 13:27:14 fetching corpus: 44298, signal 1184286/1225297 (executing program) 2021/01/20 13:27:15 fetching corpus: 44348, signal 1184665/1225297 (executing program) 2021/01/20 13:27:15 fetching corpus: 44398, signal 1185023/1225297 (executing program) 2021/01/20 13:27:15 fetching corpus: 44448, signal 1185265/1225297 (executing program) 2021/01/20 13:27:15 fetching corpus: 44498, signal 1185567/1225297 (executing program) 2021/01/20 13:27:15 fetching corpus: 44548, signal 1185963/1225297 (executing program) 2021/01/20 13:27:15 fetching corpus: 44598, signal 1186346/1225297 (executing program) 2021/01/20 13:27:16 fetching corpus: 44648, signal 1186880/1225297 (executing program) 2021/01/20 13:27:16 fetching corpus: 44698, signal 1187314/1225297 (executing program) 2021/01/20 13:27:16 fetching corpus: 44748, signal 1187831/1225297 (executing program) 2021/01/20 13:27:16 fetching corpus: 44798, signal 1188020/1225299 (executing program) 2021/01/20 13:27:16 fetching corpus: 44848, signal 1188500/1225299 (executing program) 2021/01/20 13:27:17 fetching corpus: 44898, signal 1189064/1225299 (executing program) 2021/01/20 13:27:17 fetching corpus: 44948, signal 1189307/1225304 (executing program) 2021/01/20 13:27:17 fetching corpus: 44998, signal 1189518/1225304 (executing program) 2021/01/20 13:27:17 fetching corpus: 45048, signal 1189840/1225304 (executing program) 2021/01/20 13:27:17 fetching corpus: 45098, signal 1190169/1225304 (executing program) 2021/01/20 13:27:17 fetching corpus: 45148, signal 1190365/1225304 (executing program) 2021/01/20 13:27:18 fetching corpus: 45198, signal 1191030/1225304 (executing program) 2021/01/20 13:27:18 fetching corpus: 45248, signal 1191334/1225309 (executing program) 2021/01/20 13:27:18 fetching corpus: 45298, signal 1191528/1225309 (executing program) 2021/01/20 13:27:18 fetching corpus: 45348, signal 1191963/1225312 (executing program) 2021/01/20 13:27:18 fetching corpus: 45398, signal 1192328/1225312 (executing program) 2021/01/20 13:27:18 fetching corpus: 45448, signal 1192682/1225312 (executing program) 2021/01/20 13:27:19 fetching corpus: 45498, signal 1192921/1225312 (executing program) 2021/01/20 13:27:19 fetching corpus: 45548, signal 1193151/1225312 (executing program) 2021/01/20 13:27:19 fetching corpus: 45598, signal 1193374/1225312 (executing program) 2021/01/20 13:27:19 fetching corpus: 45648, signal 1193691/1225317 (executing program) 2021/01/20 13:27:20 fetching corpus: 45698, signal 1193922/1225317 (executing program) 2021/01/20 13:27:20 fetching corpus: 45748, signal 1194285/1225317 (executing program) 2021/01/20 13:27:20 fetching corpus: 45798, signal 1194854/1225317 (executing program) 2021/01/20 13:27:20 fetching corpus: 45848, signal 1195141/1225317 (executing program) 2021/01/20 13:27:20 fetching corpus: 45898, signal 1195412/1225322 (executing program) 2021/01/20 13:27:21 fetching corpus: 45948, signal 1195701/1225322 (executing program) 2021/01/20 13:27:21 fetching corpus: 45998, signal 1195980/1225323 (executing program) 2021/01/20 13:27:21 fetching corpus: 46048, signal 1196264/1225323 (executing program) 2021/01/20 13:27:21 fetching corpus: 46098, signal 1196526/1225323 (executing program) 2021/01/20 13:27:21 fetching corpus: 46148, signal 1196905/1225323 (executing program) 2021/01/20 13:27:21 fetching corpus: 46198, signal 1197185/1225323 (executing program) 2021/01/20 13:27:22 fetching corpus: 46248, signal 1197728/1225324 (executing program) 2021/01/20 13:27:22 fetching corpus: 46298, signal 1197968/1225324 (executing program) 2021/01/20 13:27:22 fetching corpus: 46348, signal 1198298/1225324 (executing program) 2021/01/20 13:27:22 fetching corpus: 46398, signal 1198512/1225324 (executing program) 2021/01/20 13:27:22 fetching corpus: 46448, signal 1198843/1225324 (executing program) 2021/01/20 13:27:23 fetching corpus: 46498, signal 1199100/1225324 (executing program) 2021/01/20 13:27:23 fetching corpus: 46548, signal 1199432/1225324 (executing program) 2021/01/20 13:27:23 fetching corpus: 46598, signal 1199710/1225331 (executing program) 2021/01/20 13:27:23 fetching corpus: 46648, signal 1200132/1225331 (executing program) 2021/01/20 13:27:23 fetching corpus: 46698, signal 1200614/1225331 (executing program) 2021/01/20 13:27:23 fetching corpus: 46748, signal 1202229/1225331 (executing program) 2021/01/20 13:27:24 fetching corpus: 46798, signal 1202468/1225331 (executing program) 2021/01/20 13:27:24 fetching corpus: 46848, signal 1202870/1225332 (executing program) 2021/01/20 13:27:24 fetching corpus: 46898, signal 1203201/1225332 (executing program) 2021/01/20 13:27:24 fetching corpus: 46948, signal 1203490/1225332 (executing program) 2021/01/20 13:27:24 fetching corpus: 46998, signal 1203825/1225332 (executing program) 2021/01/20 13:27:24 fetching corpus: 47048, signal 1204104/1225332 (executing program) 2021/01/20 13:27:25 fetching corpus: 47098, signal 1204274/1225332 (executing program) 2021/01/20 13:27:25 fetching corpus: 47148, signal 1207468/1225332 (executing program) 2021/01/20 13:27:25 fetching corpus: 47198, signal 1207758/1225332 (executing program) 2021/01/20 13:27:25 fetching corpus: 47248, signal 1208670/1225332 (executing program) 2021/01/20 13:27:25 fetching corpus: 47298, signal 1208992/1225334 (executing program) 2021/01/20 13:27:26 fetching corpus: 47348, signal 1209384/1225334 (executing program) 2021/01/20 13:27:26 fetching corpus: 47398, signal 1209708/1225334 (executing program) 2021/01/20 13:27:26 fetching corpus: 47448, signal 1209990/1225334 (executing program) 2021/01/20 13:27:26 fetching corpus: 47498, signal 1210197/1225334 (executing program) 2021/01/20 13:27:26 fetching corpus: 47548, signal 1210429/1225334 (executing program) 2021/01/20 13:27:27 fetching corpus: 47598, signal 1210719/1225334 (executing program) 2021/01/20 13:27:27 fetching corpus: 47642, signal 1211130/1225334 (executing program) 2021/01/20 13:27:27 fetching corpus: 47642, signal 1211130/1225335 (executing program) 2021/01/20 13:27:27 fetching corpus: 47642, signal 1211130/1225335 (executing program) 2021/01/20 13:27:29 starting 6 fuzzer processes 13:27:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) syzkaller login: [ 284.619882][ T35] audit: type=1400 audit(1611149249.826:8): avc: denied { execmem } for pid=8501 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 13:27:30 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 13:27:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080)={0x6, 0x0, 0x2, 0x7, 0x0, 0x1, 0x3, 0x1f, 0x1, 0x1d, 0x6}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0xb) 13:27:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) sendto$inet(r1, 0x0, 0x0, 0x105, 0x0, 0x0) 13:27:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r1, &(0x7f0000000040)="fd", 0x1, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) [ 286.023656][ T8502] IPVS: ftp: loaded support on port[0] = 21 [ 286.234073][ T8504] IPVS: ftp: loaded support on port[0] = 21 13:27:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@prinfo={0x14}, @init={0x14}, @dstaddrv4={0x10, 0x84, 0x9}, @dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, [], 0x0}}, @dstaddrv6={0x1c, 0x84, 0xa, @local={0xfe, 0x80, [], 0x0}}, @sndrcv={0x2c}], 0x9c}, 0x0) [ 286.549856][ T8506] IPVS: ftp: loaded support on port[0] = 21 [ 286.959286][ T8502] chnl_net:caif_netlink_parms(): no params data found [ 287.044754][ T8508] IPVS: ftp: loaded support on port[0] = 21 [ 287.388177][ T8525] IPVS: ftp: loaded support on port[0] = 21 [ 287.398704][ T8504] chnl_net:caif_netlink_parms(): no params data found [ 287.702642][ T8502] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.709922][ T8502] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.722977][ T8502] device bridge_slave_0 entered promiscuous mode [ 287.736577][ T8502] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.743832][ T8502] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.754280][ T8502] device bridge_slave_1 entered promiscuous mode [ 287.764749][ T8506] chnl_net:caif_netlink_parms(): no params data found [ 287.840022][ T8504] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.848373][ T8504] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.858560][ T8504] device bridge_slave_0 entered promiscuous mode [ 287.898967][ T8504] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.906878][ T8504] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.918365][ T8504] device bridge_slave_1 entered promiscuous mode [ 287.928917][ T8502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 287.954000][ T8502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.017469][ T2990] Bluetooth: hci0: command 0x0409 tx timeout [ 288.060770][ T8502] team0: Port device team_slave_0 added [ 288.116684][ T8504] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.141690][ T8502] team0: Port device team_slave_1 added [ 288.161297][ T8504] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.171016][ T7] Bluetooth: hci1: command 0x0409 tx timeout [ 288.232681][ T8508] chnl_net:caif_netlink_parms(): no params data found [ 288.391971][ T8506] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.416918][ T8506] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.478463][ T8506] device bridge_slave_0 entered promiscuous mode [ 288.494764][ T3111] Bluetooth: hci2: command 0x0409 tx timeout [ 288.526275][ T8504] team0: Port device team_slave_0 added [ 288.556698][ T8502] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 288.568077][ T8502] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.594790][ T8502] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 288.609403][ T8504] team0: Port device team_slave_1 added [ 288.616747][ T8506] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.624186][ T8506] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.634500][ T8506] device bridge_slave_1 entered promiscuous mode [ 288.675864][ T8502] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 288.685550][ T8502] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.713698][ T8502] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 288.752875][ T8506] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.770707][ T8506] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.771055][ T8720] IPVS: ftp: loaded support on port[0] = 21 [ 288.790551][ T8525] chnl_net:caif_netlink_parms(): no params data found [ 288.812020][ T19] Bluetooth: hci3: command 0x0409 tx timeout [ 288.914764][ T8504] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 288.922291][ T8504] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.949734][ T8504] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 288.968579][ T8502] device hsr_slave_0 entered promiscuous mode [ 288.976993][ T8502] device hsr_slave_1 entered promiscuous mode [ 288.996409][ T8506] team0: Port device team_slave_0 added [ 289.031277][ T8504] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 289.038770][ T8504] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.066696][ T8504] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 289.090784][ T8506] team0: Port device team_slave_1 added [ 289.202214][ T3111] Bluetooth: hci4: command 0x0409 tx timeout [ 289.220498][ T8504] device hsr_slave_0 entered promiscuous mode [ 289.228892][ T8504] device hsr_slave_1 entered promiscuous mode [ 289.238341][ T8504] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 289.247772][ T8504] Cannot create hsr debugfs directory [ 289.255992][ T8506] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 289.264179][ T8506] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.291164][ T8506] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 289.306993][ T8506] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 289.315970][ T8506] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.343484][ T8506] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 289.408417][ T8525] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.416161][ T8525] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.425168][ T8525] device bridge_slave_0 entered promiscuous mode [ 289.434509][ T8508] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.442906][ T8508] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.450758][ T8508] device bridge_slave_0 entered promiscuous mode [ 289.468139][ T8508] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.475530][ T8508] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.486475][ T8508] device bridge_slave_1 entered promiscuous mode [ 289.534730][ T8525] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.542280][ T8525] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.551212][ T8525] device bridge_slave_1 entered promiscuous mode [ 289.587845][ T8506] device hsr_slave_0 entered promiscuous mode [ 289.596894][ T8506] device hsr_slave_1 entered promiscuous mode [ 289.606584][ T8506] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 289.616113][ T8506] Cannot create hsr debugfs directory [ 289.685895][ T8508] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.719089][ T8525] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.748700][ T8508] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.798648][ T8525] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.914912][ T8508] team0: Port device team_slave_0 added [ 289.932069][ T8508] team0: Port device team_slave_1 added [ 290.056352][ T8508] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 290.063701][ T8508] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 290.092636][ T3111] Bluetooth: hci0: command 0x041b tx timeout [ 290.099850][ T8508] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 290.116190][ T8525] team0: Port device team_slave_0 added [ 290.148346][ T8508] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 290.155932][ T8508] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 290.182734][ T8508] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 290.210803][ T8525] team0: Port device team_slave_1 added [ 290.230346][ T8720] chnl_net:caif_netlink_parms(): no params data found [ 290.243196][ T3111] Bluetooth: hci1: command 0x041b tx timeout [ 290.290112][ T8508] device hsr_slave_0 entered promiscuous mode [ 290.298782][ T8508] device hsr_slave_1 entered promiscuous mode [ 290.307167][ T8508] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 290.316016][ T8508] Cannot create hsr debugfs directory [ 290.322256][ T3111] Bluetooth: hci5: command 0x0409 tx timeout [ 290.399868][ T8525] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 290.417743][ T8525] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 290.446764][ T8525] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 290.503746][ T8525] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 290.511185][ T8525] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 290.537727][ T8525] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 290.565196][ T3111] Bluetooth: hci2: command 0x041b tx timeout [ 290.733800][ T8525] device hsr_slave_0 entered promiscuous mode [ 290.744289][ T8525] device hsr_slave_1 entered promiscuous mode [ 290.753991][ T8525] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 290.761611][ T8525] Cannot create hsr debugfs directory [ 290.877543][ T8502] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 290.885093][ T3111] Bluetooth: hci3: command 0x041b tx timeout [ 290.917692][ T8720] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.925698][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.935182][ T8720] device bridge_slave_0 entered promiscuous mode [ 290.945532][ T8720] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.953696][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.962651][ T8720] device bridge_slave_1 entered promiscuous mode [ 290.973365][ T8502] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 291.044953][ T8502] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 291.057616][ T8502] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 291.100891][ T8720] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 291.116861][ T8720] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.219928][ T8720] team0: Port device team_slave_0 added [ 291.239250][ T8720] team0: Port device team_slave_1 added [ 291.266138][ T8504] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 291.276355][ T8504] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 291.292098][ T3111] Bluetooth: hci4: command 0x041b tx timeout [ 291.309686][ T8720] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 291.319197][ T8720] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 291.345904][ T8720] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 291.377752][ T8504] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 291.409029][ T8720] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 291.416586][ T8720] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 291.446018][ T8720] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 291.471021][ T8504] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 291.579240][ T8720] device hsr_slave_0 entered promiscuous mode [ 291.588628][ T8720] device hsr_slave_1 entered promiscuous mode [ 291.598088][ T8720] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 291.616669][ T8720] Cannot create hsr debugfs directory [ 291.662487][ T8506] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 291.745188][ T8506] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 291.760371][ T8506] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 291.819807][ T8506] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 291.893329][ T8508] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 291.928155][ T8508] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 292.006200][ T8508] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 292.070802][ T8508] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 292.151015][ T8502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.162693][ T7] Bluetooth: hci0: command 0x040f tx timeout [ 292.231343][ T8525] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 292.308643][ T8525] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 292.331962][ T7] Bluetooth: hci1: command 0x040f tx timeout [ 292.356609][ T8525] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 292.368782][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.383736][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.399148][ T8502] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.412634][ T7] Bluetooth: hci5: command 0x041b tx timeout [ 292.434210][ T8525] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 292.480549][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.491498][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.500937][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.508545][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.519224][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.529029][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.537980][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.545208][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.554108][ T8720] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 292.599344][ T8504] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.611390][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 292.619750][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 292.630678][ T8720] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 292.652167][ T7] Bluetooth: hci2: command 0x040f tx timeout [ 292.674740][ T8720] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 292.727382][ T8720] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 292.736518][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 292.756475][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 292.766264][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 292.778618][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 292.852891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 292.868197][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 292.877885][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.887550][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.896227][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 292.905520][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.921638][ T8506] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.948514][ T8508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.963571][ T8939] Bluetooth: hci3: command 0x040f tx timeout [ 292.974737][ T8504] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.993527][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.004787][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.014243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.025144][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.034652][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.041850][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.054819][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.102103][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.118009][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.126870][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.144699][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.154784][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.162238][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.170096][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.179617][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.191471][ T8506] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.215487][ T8502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 293.229854][ T8508] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.252255][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 293.335263][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.346956][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.356808][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.364265][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.373977][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.383419][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.393000][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.400167][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.440027][ T3111] Bluetooth: hci4: command 0x040f tx timeout [ 293.477321][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.500722][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.543361][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.563212][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.583343][ T8939] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.590627][ T8939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.613728][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 293.633246][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.648275][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.656937][ T8939] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.664370][ T8939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.672947][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.702357][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 293.711687][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.727688][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.785882][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 293.798695][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 293.809847][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.819449][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 293.829216][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 293.839762][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 293.853437][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.863256][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 293.872732][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 293.881341][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.890683][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.902463][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 293.925764][ T8525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 293.957835][ T8502] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 293.973547][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 293.981087][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.989921][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.999775][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.018792][ T8504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.076400][ T8506] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 294.088423][ T8506] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 294.101450][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 294.112311][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.121057][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 294.131254][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 294.141529][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.150371][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.160650][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 294.170144][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 294.179528][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 294.190253][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.199844][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 294.209488][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.219797][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.228901][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 294.254856][ T8939] Bluetooth: hci0: command 0x0419 tx timeout [ 294.270130][ T8720] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.290478][ T8525] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.298473][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.308380][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.351376][ T8508] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 294.365710][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 294.382883][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.400832][ T8504] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 294.410074][ T3111] Bluetooth: hci1: command 0x0419 tx timeout [ 294.445185][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.453801][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.461328][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 294.471538][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.482845][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.492347][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.500951][ T2990] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.508157][ T2990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.516940][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.526415][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.535723][ T2990] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.543165][ T2990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.558468][ T2990] Bluetooth: hci5: command 0x040f tx timeout [ 294.560998][ T8506] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 294.618105][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.627767][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.636489][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.648200][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 294.664991][ T8720] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.726455][ T19] Bluetooth: hci2: command 0x0419 tx timeout [ 294.738805][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 294.760140][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.772946][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 294.785730][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.796030][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.807037][ T3111] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.814356][ T3111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.824409][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.833784][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.845020][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.922442][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.930856][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.944125][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.953466][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.963308][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.970418][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.978682][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 294.988836][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 294.999032][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.009638][ T8502] device veth0_vlan entered promiscuous mode [ 295.042278][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.050539][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 295.052205][ T3111] Bluetooth: hci3: command 0x0419 tx timeout [ 295.070048][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.080543][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 295.090230][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.109807][ T8508] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 295.157787][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.167548][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 295.178103][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.187796][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.196969][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.238194][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 295.248258][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.257838][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 295.267873][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.277527][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.287052][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.296273][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.306081][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.318029][ T8502] device veth1_vlan entered promiscuous mode [ 295.338875][ T8525] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 295.357098][ T8525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 295.379704][ T8504] device veth0_vlan entered promiscuous mode [ 295.391722][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 295.401389][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.413501][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.423840][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.433777][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 295.444696][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.489308][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.506188][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.522095][ T8939] Bluetooth: hci4: command 0x0419 tx timeout [ 295.539554][ T8506] device veth0_vlan entered promiscuous mode [ 295.552720][ T8504] device veth1_vlan entered promiscuous mode [ 295.576651][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 295.585615][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.600547][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 295.612812][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.653145][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.661469][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.672655][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 295.680727][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 295.689674][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 295.700557][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 295.710780][ T8506] device veth1_vlan entered promiscuous mode [ 295.787081][ T8502] device veth0_macvtap entered promiscuous mode [ 295.814500][ T8525] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 295.846824][ T8508] device veth0_vlan entered promiscuous mode [ 295.866477][ T8502] device veth1_macvtap entered promiscuous mode [ 295.877024][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 295.888152][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 295.898968][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 295.908370][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 295.918135][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 295.929384][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.950187][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 295.958195][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 295.997966][ T8720] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.010602][ T8508] device veth1_vlan entered promiscuous mode [ 296.034577][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.056535][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.076794][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 296.097235][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 296.109415][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.141310][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 296.157029][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.206371][ T8506] device veth0_macvtap entered promiscuous mode [ 296.263109][ T8504] device veth0_macvtap entered promiscuous mode [ 296.306996][ T8502] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 296.330841][ T8506] device veth1_macvtap entered promiscuous mode [ 296.360212][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 296.373355][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 296.385043][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 296.394413][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 296.405861][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 296.416071][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.426747][ T8504] device veth1_macvtap entered promiscuous mode [ 296.464806][ T8502] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 296.498550][ T8502] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 296.510121][ T8502] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 296.529876][ T8502] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 296.539779][ T8502] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 296.558304][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 296.569910][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 296.582357][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 296.626853][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 296.638391][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.642710][ T19] Bluetooth: hci5: command 0x0419 tx timeout [ 296.672767][ T8508] device veth0_macvtap entered promiscuous mode [ 296.708063][ T8506] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 296.718924][ T8506] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 296.737513][ T8506] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 296.749666][ T8508] device veth1_macvtap entered promiscuous mode [ 296.770431][ T8504] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 296.781964][ T8504] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 296.795891][ T8504] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 296.809637][ T8504] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 296.825792][ T8504] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 296.839552][ T8504] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 296.853712][ T8504] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 296.866009][ T8504] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 296.875818][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 296.885835][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 296.896841][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 296.906337][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.916271][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 296.926709][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.936168][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 296.946526][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.955942][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 296.967926][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 296.979883][ T8506] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 296.993036][ T8506] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.004241][ T8506] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.016046][ T8506] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.028953][ T8506] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 297.088750][ T8504] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.098256][ T8504] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.109681][ T8504] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.118659][ T8504] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.136657][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 297.155106][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 297.165392][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 297.175766][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 297.205328][ T8506] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.225664][ T8506] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.250262][ T8506] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.267353][ T8506] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.309069][ T8525] device veth0_vlan entered promiscuous mode [ 297.334604][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 297.344511][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.356666][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.371308][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.510370][ T8508] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.538491][ T8508] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.550047][ T8508] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.572135][ T8508] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.594538][ T8508] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.632093][ T8508] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.656784][ T8508] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 297.714660][ T197] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 297.729085][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 297.751679][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.772658][ T197] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 297.788274][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 297.823347][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.835940][ T8525] device veth1_vlan entered promiscuous mode [ 297.874366][ T8508] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.886310][ T8508] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.897127][ T8508] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.909452][ T8508] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.921586][ T8508] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.933707][ T8508] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.947409][ T8508] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 297.960291][ T8720] device veth0_vlan entered promiscuous mode [ 297.977756][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 297.995872][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.006328][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.015457][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 298.025531][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 298.057309][ T8508] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 298.066348][ T8508] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 298.088357][ T8508] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 298.109016][ T8508] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 298.141606][ T8720] device veth1_vlan entered promiscuous mode [ 298.166475][ T65] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 298.188280][ T65] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 298.293390][ T9808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 298.323721][ T9808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.390261][ T8525] device veth0_macvtap entered promiscuous mode [ 298.406623][ T9808] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 298.416923][ T9808] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 298.526353][ T8525] device veth1_macvtap entered promiscuous mode [ 298.604861][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 298.628146][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 298.668097][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 298.679905][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 298.690608][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 298.695230][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 298.734135][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.751596][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 13:27:44 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) [ 298.841207][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 298.875270][ T8720] device veth0_macvtap entered promiscuous mode [ 298.935324][ T8525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 298.984750][ T8525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.998166][ T8525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 299.010957][ T8525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.022867][ T8525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 299.036838][ T8525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.050681][ T8525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 299.077312][ T8525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.107191][ T8525] batman_adv: batadv0: Interface activated: batadv_slave_0 13:27:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x5452, &(0x7f0000000080)) [ 299.147864][ T8720] device veth1_macvtap entered promiscuous mode [ 299.158587][ T9870] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 299.170135][ T9870] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 299.227111][ T9808] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 299.257549][ T9808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 299.277945][ T9808] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 299.311296][ T8525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 299.334961][ T8525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.351238][ T8525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 299.373000][ T8525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.394067][ T8525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 299.410872][ T8525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.425034][ T8525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 299.436884][ T8525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.476298][ T8525] batman_adv: batadv0: Interface activated: batadv_slave_1 13:27:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) setfsgid(0x0) [ 299.548671][ T9869] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 299.579830][ T9869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 299.641460][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 299.661476][ T8525] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.680149][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 299.703223][ T8525] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.722978][ T8525] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.741292][ T8525] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.797287][ T9869] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 299.853600][ T197] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 299.869617][ T8720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 13:27:45 executing program 1: syz_io_uring_setup(0x4862, &(0x7f0000000080), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x4867, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x0, 0x1a5}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 299.913995][ T197] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 299.925003][ T8720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.974205][ T8720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 299.999341][ T8720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.033456][ T8720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 300.053933][ T8720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.070599][ T8720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 300.084348][ T8720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.109573][ T8720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 300.124687][ T8720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.158596][ T8720] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 300.183518][ T9869] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 300.205187][ T9869] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 300.245579][ T9869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 13:27:45 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) r4 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) ftruncate(r4, 0x0) [ 300.340354][ T8720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 13:27:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000180)="0fae0dd0ee0f005a850f91d4360f0ff3b63ef0fe4e00660fe30a66b891d7e4700f23c00f21f8663503000a000f23f82e0f1c570f0f30", 0x36}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:27:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a}, 0x1c) [ 300.410226][ T8720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.455042][ T8720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 300.478199][ T8720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.502773][ T8720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 300.521853][ T8720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.572096][ T8720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 300.614250][ T8720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.640988][ T8720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 300.670406][ T8720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.703838][ T8720] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 300.776506][ T9869] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 300.793905][ T9869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 300.820917][ T9950] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 13:27:46 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) r4 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) ftruncate(r4, 0x0) [ 300.911015][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 300.938388][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 301.007213][ T8720] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 13:27:46 executing program 0: syz_open_dev$evdev(&(0x7f00000021c0)='/dev/input/event#\x00', 0x0, 0x4800) [ 301.063693][ T8720] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 301.084107][ T8720] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 301.121624][ T8720] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 301.145587][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 301.177325][ C0] hrtimer: interrupt took 44091 ns [ 301.346044][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 301.380575][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 301.521229][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 13:27:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000080)=0x9) [ 301.563429][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 301.596619][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 301.659462][ T3111] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 301.696154][ T9870] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 301.706262][ T9870] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 301.736682][ T9808] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 301.808305][ T9870] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 301.826173][ T9870] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 13:27:47 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) r6 = dup3(r3, r5, 0x80000) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 301.861614][ T9808] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 13:27:47 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001140)={0x18, 0xa, &(0x7f0000000000)=@framed={{}, [@ldst={0x1}, @func, @initr0, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x7, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:27:47 executing program 1: io_setup(0x9, &(0x7f0000000200)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)) 13:27:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 13:27:47 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) r4 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) ftruncate(r4, 0x0) 13:27:47 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x2ffff, 0x0) 13:27:47 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x10000000) 13:27:47 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) r4 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) ftruncate(r4, 0x0) 13:27:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000e80)=0x10) 13:27:47 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, [0x0, 0x2], 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [0x0, 0xff], {0x0, 0x6, '$\x00@', 0xe135, 0x3a, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, @loopback, [], "050c68deb1caadea"}}}}}}}, 0x0) 13:27:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x19, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 13:27:47 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)=""/178, 0xb2}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/112, 0x70}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000740)=""/77, 0x4d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x2) recvfrom$inet(r3, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r2, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r4 = socket(0x2, 0x5, 0x0) recvfrom$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r3, 0x0) 13:27:49 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:27:49 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='\x00') setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x14) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) 13:27:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x2404c0c4, 0x0, 0x0) sendto$inet(r0, &(0x7f0000002a00)="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", 0xb1c, 0x40900, &(0x7f0000000d00)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2c}}, 0x10) 13:27:49 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="5300000044a6aeabc81e1520000000000000001000fff64017db9820000000000000d403ffff6377cdb5b524347c47478bdfdb968f3b27e59aa146175dd106736d173f0fc7ec6e26710000000049d2e181baf9459c5c953148c6801d2c0945a08ba8c552fc99a742000080812d274014ae40b8ae4f2a88d2fbea75e16a61fd063f026bd7360627ec60cb274e00da971f7ee096d74c92fad7e34bd5522d45cc36c2442eac2d224609aba9e6000000000000000000000000000000f390d71cc6092c0100b049f3fc65d61c2b3c65f2f80a61ea6e457ebc93981b20e03b86d4e999bba83a7b0ee0ce30e80600cff8ca2996e518e3e69051f6d24317f9ebfeb82ee2469fb21be3d037359f1886a0ecfea4342b11a5dbb27622cd9f9d843a8d25f196ab6f2dc045421b94d878d0d9c2a5c74633a687a135308e49ce118c81517ac7bb2994ccc7e054d3f18c15fce4908dd3deaafaab51144c1e1ba6b6291f5e73ff040000005f01eb88910285f6dd69048821b68b5f2e9cecb34ad4000000007a6e3cdf09bc1a8e99592b3c4fbdc777d8532e0d70be3e431198daca0f4be4cf57ca900d12a01a9221c844e28a6c53a26058375113fdd3bb6e53262f83e7c80ba677320b12c843464f2d96463acc1f4ebcf33068b222499f8b119e2072d4efea53dc01cf640840ab9a9dd6b9c80f3c7f5b67bd20d5c0349548c64db5dddbffafe7da8b4f277dbf9d80e6e596575e6b44c483adc4b5fdeaaa46149da1a6757ed7e97544517f32a976ef3c66e033da46bfa31468eba625d264673301883128266b6201eacdfe51736c31f7feb6f6030a10e69c903927a5c11effd62911abc72d261c2eeb0a7c7f08bb280c4fc342717c43d8e2192f121cedce1b0440d42644ff87aec60a58a490e012785e2d04eba58a52cc9f15d9e9bcec24a3230a7bff038000000000003a3964045af092de789b7ef8ce392c4704d324b954be4d817cc3a5d5096e15b1aceeaf5631a8e510ad0c0467e033ce6c4e989c2e0f8b947ad687df3f5a18a26163815865e05ca718ece427f792ce459abdaf4f37ba61dc89567451000000000000000000da5fad4927bcc92b26fc45d76e64a428257381d2e46d6adc68cf5da791865bb3a834ecb6ed99147efcc54bcb21c16ccc8e65a5fc0b336a01c1fb7ea7632e9eef404b16867bec7ab5ed9604a5f0496f5b974848e02e7c1f1e8963cb608adb66979a5d28771337518009e449006457bc3b9e34a98472682fd9758c963c7b89f4f6e502b78df6534d00"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x275a, 0x0) 13:27:49 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 304.278263][ C1] sd 0:0:1:0: [sg0] tag#3740 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 304.288917][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB: Test Unit Ready [ 304.295478][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.306101][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.315768][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13:27:49 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0xf, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x41b7, 0x5}, 0x14) [ 304.325490][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.335181][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.344867][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.354528][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.364198][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.373854][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.383531][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.393653][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.403374][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.413076][ C1] sd 0:0:1:0: [sg0] tag#3740 CDB[c0]: 00 00 00 00 00 00 00 00 13:27:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f9becdb4cb92e0a48b1371400000068bd6efb2503eaff0d000100020200ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001000810804259becdb4cb92e0a48b1371400000069bd6efb2503eaff0d000100020203bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) [ 304.679836][T10092] device batadv0 entered promiscuous mode 13:27:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x4138ae84, 0x0) 13:27:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 13:27:49 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 304.815169][ C1] sd 0:0:1:0: [sg0] tag#3741 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 304.826262][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB: Test Unit Ready [ 304.832995][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.842666][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.852525][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.862572][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.872637][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.882554][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.892229][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.901891][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.911492][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.921202][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.930873][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.940536][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 304.950315][ C1] sd 0:0:1:0: [sg0] tag#3741 CDB[c0]: 00 00 00 00 00 00 00 00 [ 305.264312][T10094] 8021q: adding VLAN 0 to HW filter on device batadv0 13:27:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000002140)='net/ipv6_route\x00') read$FUSE(r0, 0x0, 0x0) 13:27:50 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) socket(0x10, 0x2, 0x0) setresuid(0x0, 0x0, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:50 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='\x00') setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x14) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) 13:27:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x903, &(0x7f0000000340)={0x0, 0x7, 0xf46}, 0x8) 13:27:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 13:27:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f9becdb4cb92e0a48b1371400000068bd6efb2503eaff0d000100020200ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001000810804259becdb4cb92e0a48b1371400000069bd6efb2503eaff0d000100020203bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) [ 305.457722][ C1] sd 0:0:1:0: [sg0] tag#3742 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 305.468251][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB: Test Unit Ready [ 305.474831][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.484505][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.494150][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.503835][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.513510][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.523424][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.533137][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.542796][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.552442][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.562235][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.572084][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.581718][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.591477][ C1] sd 0:0:1:0: [sg0] tag#3742 CDB[c0]: 00 00 00 00 00 00 00 00 [ 305.599137][ C1] sd 0:0:1:0: [sg0] tag#3743 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 305.609743][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB: Test Unit Ready [ 305.616508][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.626530][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.636383][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.646060][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.655927][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.665944][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.675974][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.685793][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.695553][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13:27:50 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) socket(0x10, 0x2, 0x0) setresuid(0x0, 0x0, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 305.705381][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.715235][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.725132][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 305.734936][ C1] sd 0:0:1:0: [sg0] tag#3743 CDB[c0]: 00 00 00 00 00 00 00 00 13:27:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 13:27:51 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x38}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000380)=0x68) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='\x00') setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) [ 306.062529][ C1] sd 0:0:1:0: [sg0] tag#3744 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 306.073198][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB: Test Unit Ready [ 306.079676][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.089335][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.099020][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.108692][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.118327][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.128019][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.137664][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.147310][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.156947][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.166589][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.176246][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.186047][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 306.195744][ C1] sd 0:0:1:0: [sg0] tag#3744 CDB[c0]: 00 00 00 00 00 00 00 00 13:27:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c00000026002908000000000000000004"], 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 13:27:51 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) socket(0x10, 0x2, 0x0) setresuid(0x0, 0x0, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 306.561950][T10137] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 13:27:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x275a, 0x0) 13:27:51 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 306.737997][T10124] 8021q: adding VLAN 0 to HW filter on device batadv0 13:27:52 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c00000026002908000000000000000004"], 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 13:27:52 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x2c}}, 0x0) r1 = socket$inet(0x2, 0x3, 0x6) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000001c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='\x00') setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) 13:27:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f9becdb4cb92e0a48b1371400000068bd6efb2503eaff0d000100020200ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001000810804259becdb4cb92e0a48b1371400000069bd6efb2503eaff0d000100020203bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) [ 307.041314][ C1] sd 0:0:1:0: [sg0] tag#3745 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 307.051843][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB: Test Unit Ready [ 307.058315][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.068001][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.077656][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.087342][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.097006][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.107523][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.117245][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.126992][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.136784][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.146622][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.156340][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.166091][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.176369][ C1] sd 0:0:1:0: [sg0] tag#3745 CDB[c0]: 00 00 00 00 00 00 00 00 [ 307.184334][ C1] sd 0:0:1:0: [sg0] tag#3746 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 307.194845][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB: Test Unit Ready [ 307.201314][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.210998][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.220678][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.230440][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.240259][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.249942][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.259629][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.269289][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.279102][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.288793][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.298450][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.308123][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.317827][ C1] sd 0:0:1:0: [sg0] tag#3746 CDB[c0]: 00 00 00 00 00 00 00 00 [ 307.325484][ C1] sd 0:0:1:0: [sg0] tag#3747 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 307.335938][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB: Test Unit Ready [ 307.342582][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.352283][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.362983][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.372768][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.382671][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.392375][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.402022][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.411673][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.421369][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.431355][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13:27:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x275a, 0x0) [ 307.441070][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.450734][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.460576][ C1] sd 0:0:1:0: [sg0] tag#3747 CDB[c0]: 00 00 00 00 00 00 00 00 13:27:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x275a, 0x0) [ 307.745868][T10156] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 307.806095][ C1] sd 0:0:1:0: [sg0] tag#3748 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 307.816652][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB: Test Unit Ready [ 307.823197][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.832884][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.842572][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.852221][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.861909][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.871518][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.881197][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.890888][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13:27:53 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:53 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_getsetattr(r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 307.900868][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.910617][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.920397][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.930107][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 307.939785][ C1] sd 0:0:1:0: [sg0] tag#3748 CDB[c0]: 00 00 00 00 00 00 00 00 13:27:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x275a, 0x0) 13:27:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x275a, 0x0) [ 308.175449][T10163] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 308.250353][ C1] sd 0:0:1:0: [sg0] tag#3749 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 308.260901][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB: Test Unit Ready [ 308.267679][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.277713][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.287578][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.297299][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.306995][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.316680][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.326396][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.336185][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.346738][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.356415][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.366132][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.375816][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 308.385639][ C1] sd 0:0:1:0: [sg0] tag#3749 CDB[c0]: 00 00 00 00 00 00 00 00 13:27:53 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x275a, 0x0) 13:27:54 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c00000026002908000000000000000004"], 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 13:27:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f9becdb4cb92e0a48b1371400000068bd6efb2503eaff0d000100020200ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001000810804259becdb4cb92e0a48b1371400000069bd6efb2503eaff0d000100020203bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) 13:27:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/924], 0x14f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000087cf010000e7ffffffffffffff01000000000000", @ANYRES32=r1, @ANYBLOB="00000011b997d0a612ea31139d0c00030087b61e2c80d8ee155fc00cefe3062aedcf452d5f42f4870000000000000086805122096a32eda43643b415fda57ca72c1da8c4c9a9e470e658e0"]) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x275a, 0x0) 13:27:54 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x2c}}, 0x0) r1 = socket$inet(0x2, 0x3, 0x6) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000001c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='\x00') setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) 13:27:54 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_usb_disconnect(0xffffffffffffffff) [ 309.801893][ C1] scsi_io_completion_action: 3 callbacks suppressed [ 309.801944][ C1] sd 0:0:1:0: [sg0] tag#3754 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 309.819235][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB: Test Unit Ready [ 309.825862][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 309.829055][T10201] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 309.835595][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 309.835632][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 309.835660][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 309.835687][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 309.835733][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13:27:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/128, 0x80}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)=""/176, 0xb0}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000080)=""/60, 0x29}, {&(0x7f0000000280)=""/88, 0x58}, {&(0x7f00000003c0)=""/218, 0xda}, {&(0x7f00000000c0)=""/6, 0x8}, {&(0x7f00000004c0)=""/147, 0x93}, {&(0x7f00000007c0)=""/235, 0xeb}, {&(0x7f0000000680)=""/156, 0x9c}, {&(0x7f0000000580)=""/135}, {&(0x7f00000008c0)=""/212}, {&(0x7f00000009c0)=""/158}, {&(0x7f0000000a80)=""/72}, {&(0x7f0000000b00)=""/225}], 0x1000000000000012}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00511) shutdown(r3, 0x0) mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r5 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r5, 0x0) accept4(r5, &(0x7f0000000040)=ANY=[], &(0x7f0000001080), 0x0) shutdown(r4, 0x0) [ 309.835761][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 309.835789][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 309.835825][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 309.835853][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 309.835882][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 309.835910][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 309.835937][ C1] sd 0:0:1:0: [sg0] tag#3754 CDB[c0]: 00 00 00 00 00 00 00 00 [ 310.032622][T10201] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 13:27:55 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 310.434042][T10205] 8021q: adding VLAN 0 to HW filter on device batadv0 13:27:55 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:55 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x2c}}, 0x0) r1 = socket$inet(0x2, 0x3, 0x6) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000001c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='\x00') setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) 13:27:55 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r1, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff00}], 0x1, &(0x7f0000007880)=ANY=[@ANYBLOB="1100000000000000004003080100000000000000050008001c00000000000000000000fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c00000000000000090000000888f800", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000240000000000000000000000070000009404000044100900000000000000000000007e000000000011000000000000000000001f00"/76], 0x98}, 0x0) 13:27:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000040)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000280)=""/146, 0x92}, {0x0}, {0x0}], 0xe) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e007ae) shutdown(r3, 0x0) shutdown(0xffffffffffffff9c, 0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r5, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) shutdown(r4, 0x0) 13:27:56 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x3}, 0xc) sendto(r0, &(0x7f00000004c0)="02", 0x1, 0x0, &(0x7f0000000400)=@in={0x10, 0x2}, 0x10) 13:27:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000480)={0x0, @in, 0x9, 0x1000, 0x215}, 0x98) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x27) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:27:56 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x2c}}, 0x0) r1 = socket$inet(0x2, 0x3, 0x6) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000001c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='\x00') setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) 13:27:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000019840)=""/4082, 0xff2}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/51, 0x33}, {0x0}, {0x0}, {0x0}], 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000001c00)="b426652889b178ebce91f988753e32ee65525659197452117a5d2e962fc3608386fdb450862af17c3dcaf2915a4dd93bd6511cbc9c8eaba240e3552a13f588442d8d86f43f6698bab04a9dd0503a28ee335547ff56d057ee9bd5377565bf8d35f5dff40081979e93c4cbbe6a0c73313e0797c044a695f619908341e1988996ddd4c642f8320484605a4a2a081a9b907cc1d63fc29d83b86a44395d7a35288ca69487fc6b50518510c94174ef5838474a0d8747a8b8f4adfcecb58315a07b4cf827011a8fe65afa7a30a2527acde3cfee5907eb37cb922de747cf6acf7a5f375e5807d1145b6a7c", 0xfec0}], 0x1) shutdown(r3, 0x0) execve(0x0, 0x0, 0x0) 13:27:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0xc18}, 0x10) 13:27:56 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/5, 0x5}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcf1c, 0x0, 0x0, 0x800e00551) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)=""/201, 0xc9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000480)=""/243, 0xf3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xb) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r5, 0x0) r7 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r7, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0, 0x0) shutdown(r6, 0x0) shutdown(r4, 0x0) 13:27:57 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000180)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000040)="9cffffffffffba007a9b807a8100252b88a8", 0x12}], 0x1}, 0x0) 13:27:57 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 311.890975][T10275] batman_adv: batadv0: adding TT local entry ba:00:7a:9b:80:7a to non-existent VLAN 1323 13:27:57 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000180)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000040)="9cffffffffffba007a9b807a8100252b88a8", 0x12}], 0x1}, 0x0) [ 312.118108][T10281] batman_adv: batadv0: adding TT local entry ba:00:7a:9b:80:7a to non-existent VLAN 1323 13:27:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)=""/26, 0x1a}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xb}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000000a40)=[{&(0x7f0000000340)=""/237, 0xed}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00541) shutdown(r4, 0x0) r6 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r6, &(0x7f00000000c0)="a9c3936d6ee888a2fff1dec76466cce89de782d2bef3928a50e1a8837889ff725a605aa7139b10ee8edae1428549a53ac722e62c67eb746d1739a7375040ab87fdc41f903e762c8a8b8b0a23e57e03066b343f1f2365e5732d90fc2716ef6f8a3de94b65c2243e662a4a201a8f908809dfef527a5ea60a4b974b66e1087dc2eb242ff47c2e9de07c04c51728833ffcbe", 0xffffff5a, 0x105, &(0x7f0000000000)={0xfffffffffffffea3, 0x1c, 0x2}, 0x1c) shutdown(r5, 0x0) shutdown(r3, 0x0) execve(0x0, 0x0, 0x0) 13:27:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000004c0)=""/4081, 0xff1}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff68, 0x0, 0x0, 0x800e00547) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/130, 0x82}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) select(0x40, &(0x7f00000000c0)={0x2}, 0x0, 0x0, 0x0) r4 = dup(r3) shutdown(r4, 0x0) 13:27:57 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:57 executing program 3: syz_emit_ethernet(0x38, &(0x7f0000000100)={@broadcast, @random="b57e6ea31b6a", @val, {@ipv6}}, 0x0) 13:27:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={0x0}}, 0x0) getsockname(r1, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000200)=@bridge_delvlan={0x24, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x2, 0x1}}}]}, 0x24}}, 0x0) 13:27:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000019840)=""/4082, 0xff2}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/51, 0x33}, {0x0}, {0x0}, {0x0}], 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000001c00)="b426652889b178ebce91f988753e32ee65525659197452117a5d2e962fc3608386fdb450862af17c3dcaf2915a4dd93bd6511cbc9c8eaba240e3552a13f588442d8d86f43f6698bab04a9dd0503a28ee335547ff56d057ee9bd5377565bf8d35f5dff40081979e93c4cbbe6a0c73313e0797c044a695f619908341e1988996ddd4c642f8320484605a4a2a081a9b907cc1d63fc29d83b86a44395d7a35288ca69487fc6b50518510c94174ef5838474a0d8747a8b8f4adfcecb58315a07b4cf827011a8fe65afa7a30a2527acde3cfee5907eb37cb922de747cf6acf7a5f375e5807d1145b6a7c", 0xfec0}], 0x1) shutdown(r3, 0x0) execve(0x0, 0x0, 0x0) 13:27:57 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:57 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000400)=ANY=[], 0x15cb3c6c) r2 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 13:27:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)=ANY=[@ANYRES32=0x0], &(0x7f0000001700)=0x8) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) r6 = dup2(r5, r5) r7 = dup2(r4, r6) sendmsg$inet_sctp(r7, &(0x7f00000005c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r7, 0x84, 0x1a, &(0x7f0000000040)={r3}, 0x8) 13:27:57 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:58 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)=""/145, 0x91}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/136, 0x88}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000340)=""/30, 0x1e}, {0x0}], 0x2}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/174, 0xae}], 0x1}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xffffff1d, 0x0, 0x0, 0x800e00549) shutdown(r4, 0x0) r6 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r6, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 13:27:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1c8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff010000001d00000000000000000065723b2726633000000000000000000062726964676530000000000000000000b43b24af61af8e2f000000000000000065716c00000000000000000000000000ffffffffffff000000000000aaaaaaaaaa000000000000000000a000000010010000380100006d61726b5f6d00000000000000000000000000000000020000000000000000000c0000000400000001000000000100006e664c6f670000000000000000000000000000000000000000000000000000004c0000006d8000000900090000000000b80eba8ec4468a0538ee0eed5dd9119d918668afa6c019b085be3837595dc113ccf27499f7202a2b59394b2619bcf57ec99b9abb99943198532b0b7bdd0f61e5726564697265637400000000000000000000000000000000000000000000000004000000fd00ffff"]}, 0x240) 13:27:58 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0xf, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x902, &(0x7f00000001c0), 0x4) 13:27:58 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:58 executing program 5: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000280)=""/244, 0xf4}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000800)=""/4096, 0x1000}], 0x2}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffc2, 0x0, 0x0, 0x800e00778) shutdown(r2, 0x0) r4 = socket(0x2, 0x1, 0x0) connect$unix(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="bf02dd6c7b"], 0x10) shutdown(r3, 0x0) 13:27:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000033c0), 0x0, &(0x7f00000034c0)={[{@rodir='rodir'}]}) 13:27:58 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@fat=@fmask={'fmask', 0x3d, 0xffe000000000000}}]}) 13:27:58 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc020660b, 0x0) [ 313.764032][T10365] FAT-fs (loop1): bogus number of reserved sectors [ 313.779871][T10365] FAT-fs (loop1): Can't find a valid FAT filesystem 13:27:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:59 executing program 4: prctl$PR_SET_TSC(0x2f, 0x0) [ 313.983241][T10365] FAT-fs (loop1): bogus number of reserved sectors [ 313.996385][T10365] FAT-fs (loop1): Can't find a valid FAT filesystem 13:27:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000300)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@fastopen={0x5, 0x2}]}}}}}}}}, 0x0) 13:27:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000300)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@fastopen={0x3, 0x2}]}}}}}}}}, 0x0) 13:27:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:59 executing program 4: prctl$PR_SET_TSC(0x2a, 0x1) 13:27:59 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:27:59 executing program 5: clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timer_create(0x7, 0x0, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{0x77359400}, {0x0, r0+60000000}}, 0x0) 13:27:59 executing program 0: syz_open_dev$usbfs(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x2e483) 13:27:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:27:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x11, 0x0, 0x0, 0x0) 13:27:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x31, 0x0, 0x0) 13:27:59 executing program 3: madvise(&(0x7f0000ff8000/0x4000)=nil, 0x807400, 0x0) 13:28:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x3, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x74}}, &(0x7f0000000180)='GPL\x00', 0x4, 0x94, &(0x7f00000001c0)=""/148, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:00 executing program 4: prctl$PR_SET_TSC(0x29, 0x1) 13:28:00 executing program 5: clone(0xd8248500, 0x0, 0x0, 0x0, 0x0) 13:28:00 executing program 2: mkdir(0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:00 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x4b47, 0x0) 13:28:00 executing program 3: bpf$MAP_CREATE(0x14, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 13:28:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x28, 0x3, 0x8, 0x5, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @sctp}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x28}}, 0x0) [ 315.078468][ T35] audit: type=1400 audit(1611149280.286:9): avc: denied { sys_admin } for pid=10428 comm="syz-executor.5" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 13:28:00 executing program 5: prctl$PR_SET_TSC(0x21, 0x400000) 13:28:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000000300)="01434430303101004c494e55592020202020202020202020202020202020202005202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf200000000000bf000100000000000000000000000000000000000000000000000000000000000100000101000001000808", 0x82, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)=ANY=[]) 13:28:00 executing program 2: mkdir(0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:00 executing program 0: pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xb, 0xffffffffffffffff) 13:28:00 executing program 3: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xb) [ 315.337716][T10440] loop1: detected capacity change from 136 to 0 13:28:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2, 0x0, 0x300) [ 315.408140][T10440] ISOFS: Bad logical zone size 2056 13:28:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x400, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd600a3ff200140600fe8000000000000000000000000000bbfe8000000000008c583905ca274507cf70cacc0000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_emit_ethernet(0xa0, &(0x7f00000002c0)={@broadcast, @local, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x3, 0x1, 0x3}}, {@llc={0x4, {@snap={0x1, 0x0, "94", "f972b2", 0x6005, "83caaf64938cd38d5742a58e720ec126d37fa92dc917d73f6b58dac256dc24dbc11002476952f5874f5f6a0148bdef02b98be3ec023b0faf380e2ab4d38a68a18fe96818a553eff2227fa8f11abf62dc2921ba3e7b93174e3673178d27ee77aaade949a569ae3e66401f572be52c4e4e6996a3d4bc27943dae481cfd853594b467cc"}}}}}, &(0x7f0000000380)={0x0, 0x3, [0xdb8, 0x9b8, 0xdee, 0x9ce]}) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)="e58c6436c69df2425db1a24d9b98a0d1f6ea5a415a0593ba5c87e47f282fc790c182224bf74e49c1589a31474477cffbfa11054b4bc23a3a41bf7a72ebcb285373c67ce78d2b7326ac141279de76390580f685b67705e88ac882d7ff63dc43e0b3bb6f162002d9c290142aa4bb883c13488d31cc74a920404a04c283ffff470e5d63e2085545e219042e8bc41b7b734cf13205b401cdc811bd1fd5fed0c81a18828c835177ebf8266a851408ac852c5d4e72b69c10a7374904babe230f0c36d800d6d3e46a4a4e8d383e7908d3dbd43ec7e3507dd31487205443739a45ec5bfc524bde4e873974dbac1cb092", 0xec, 0x8000, &(0x7f00000004c0)={0xa, 0x4e24, 0xfffffffe, @local, 0x81}, 0x1c) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, 0x1, 0x4, 0x101, 0x0, 0x0, {0x3, 0x0, 0x3}, [@NFULA_CFG_MODE={0xa, 0x2, {0xfffffff9, 0x2}}, @NFULA_CFG_MODE={0xa}, @NFULA_CFG_CMD={0x5, 0x1, 0x4}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x2}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x2}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10000}, 0x20000800) syz_emit_ethernet(0x5a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000240600fe8000000000000000000000000000bbfe0100000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="90000000907800001e102000"/24], 0x0) 13:28:00 executing program 5: prctl$PR_SET_TSC(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000800)='personality\x00') 13:28:00 executing program 0: bpf$MAP_CREATE(0xa, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 13:28:00 executing program 2: mkdir(0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:00 executing program 3: prctl$PR_SET_TSC(0x4, 0x400000) 13:28:00 executing program 1: syz_mount_image$nfs(&(0x7f0000000180)='nfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) 13:28:01 executing program 5: fanotify_init(0x8, 0x0) 13:28:01 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000080)={{0x1}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) 13:28:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x4a, 0x0, 0x0) 13:28:01 executing program 3: mlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 13:28:01 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x38, 0x3, 0x8, 0x5, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_CLOSED={0x8}, @CTA_TIMEOUT_SCTP_SHUTDOWN_ACK_SENT={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x38}}, 0x0) 13:28:01 executing program 5: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, 0x0, 0x0) 13:28:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x6, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:28:01 executing program 3: pipe2(&(0x7f00000020c0)={0xffffffffffffffff}, 0x0) mmap$snddsp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4085113, r0, 0x0) 13:28:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="5c72ae09bd93fd23e218b0c595262195", 0x10) 13:28:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x3, &(0x7f00000004c0)=@framed={{0x18, 0xa}}, &(0x7f0000000180)='GPL\x00', 0x4, 0x94, &(0x7f00000001c0)=""/148, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:01 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x80045400, &(0x7f0000000040)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) 13:28:01 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:01 executing program 4: r0 = getpgid(0x0) process_vm_writev(r0, &(0x7f0000000380)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1, &(0x7f0000000780)=[{&(0x7f0000000400)=""/107, 0x7ffff000}, {&(0x7f0000000480)=""/193, 0xc1}], 0x2, 0x0) 13:28:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x3, &(0x7f00000004c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x4, 0x94, &(0x7f00000001c0)=""/148, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:01 executing program 3: clone(0x8bc1ad80, 0x0, 0x0, 0x0, 0x0) 13:28:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1b, 0x0, 0x0) 13:28:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x2, &(0x7f0000000280)=@raw=[@map], &(0x7f0000000300)='syzkaller\x00', 0x6, 0xba, &(0x7f0000000340)=""/186, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:02 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000080)={0x9, 0x2, 0x61b, 0x6}, 0x40) 13:28:02 executing program 1: clock_adjtime(0x0, &(0x7f00000002c0)={0x8001}) 13:28:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x40, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:28:02 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040), 0xe) 13:28:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x3, 0x0, 0x300) 13:28:02 executing program 1: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x11) 13:28:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000080)={0x9, 0x2, 0x61b, 0x6}, 0x40) 13:28:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x28, 0x3, 0x8, 0x5, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @sctp}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0x28}}, 0x0) 13:28:02 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x214080, 0x0) 13:28:02 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x3, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f0000000180)='GPL\x00', 0x4, 0x94, &(0x7f00000001c0)=""/148, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x2, &(0x7f0000000200)=@raw=[@map_val], &(0x7f0000000240)='GPL\x00', 0x3, 0x81, &(0x7f0000000280)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:02 executing program 3: clock_gettime(0x7881ef5183b2de37, 0x0) 13:28:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000080)={0x9, 0x2, 0x61b, 0x6}, 0x40) 13:28:02 executing program 0: madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xa) 13:28:03 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:03 executing program 5: madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1) madvise(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0) 13:28:03 executing program 1: perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:28:03 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x3, 0xed, &(0x7f0000000080)=""/237, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000080)={0x9, 0x2, 0x61b, 0x6}, 0x40) 13:28:03 executing program 0: clock_nanosleep(0x7ca7ccd8c669effd, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x0) 13:28:03 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x40345410, &(0x7f0000000040)={{0x3}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) 13:28:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[{0xfffffffffffffffd}], 0x0, 0x0) 13:28:03 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:03 executing program 4: prctl$PR_SET_TSC(0x7, 0x0) 13:28:03 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x3a, 0x1, &(0x7f0000000140)=@raw=[@jmp], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:03 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{}, {0x8}}) 13:28:03 executing program 1: timer_create(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0) 13:28:03 executing program 4: timer_create(0x2, 0x0, &(0x7f0000001380)) timer_settime(0x0, 0x0, &(0x7f00000013c0)={{0x0, 0x3938700}, {0x77359400}}, 0x0) 13:28:03 executing program 3: select(0x40, &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x4}, &(0x7f00000000c0)={0x6}, &(0x7f0000000100)={0x0, 0x2710}) 13:28:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:28:04 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:28:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x28, 0x3, 0x8, 0x5, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @tcp}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x28}}, 0x0) 13:28:04 executing program 4: process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1226, &(0x7f0000000280)=[{&(0x7f0000000300)=""/107, 0x6b}, {&(0x7f0000000100)=""/205, 0xcd}, {&(0x7f0000000000)=""/96, 0x60}, {&(0x7f0000000080)=""/103, 0x67}, {&(0x7f00000003c0)=""/126, 0x7a}], 0x5, 0x0) 13:28:04 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0x6, 0x0, 0x0) 13:28:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f00000000c0)="28aaff82e411f51fdaea16fab075bad56b94f83ac893861a13c9911a18d6668f", 0x20) 13:28:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x4b, 0x0, 0x0) 13:28:04 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:04 executing program 1: syz_mount_image$nfs(&(0x7f0000000080)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaab96, &(0x7f0000000440), 0x0, &(0x7f0000000100)={[{'S\xf9\xd7\xf4\xe3\xb4\x0f\x19\xabv(^\x8a'}], [{@appraise='appraise'}]}) 13:28:04 executing program 4: madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1) madvise(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0xa) 13:28:04 executing program 3: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x200001b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:28:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@mss, @sack_perm, @mss, @timestamp], 0x4) 13:28:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000800)='personality\x00') mmap$snddsp_status(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x100010, r0, 0x82000000) 13:28:04 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:04 executing program 3: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00') 13:28:04 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000002200)='/proc/self/attr/fscreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) 13:28:05 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x1cd3e76cb7ad8b1e, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) preadv(r0, &(0x7f0000000000)=[{0x0}, {0x0}], 0x2, 0x0, 0x7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1) [ 319.790066][ T35] audit: type=1400 audit(1611149284.996:10): avc: denied { execute } for pid=10616 comm="syz-executor.0" path="/proc/10616/personality" dev="proc" ino=35269 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 13:28:05 executing program 0: timer_create(0x2, 0x0, &(0x7f0000000280)) timer_gettime(0x0, &(0x7f00000002c0)) 13:28:05 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x40045402, &(0x7f0000000040)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) 13:28:05 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:05 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000), 0x8) connect$bt_sco(r0, &(0x7f0000000180), 0x8) 13:28:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:28:05 executing program 0: socket(0x10, 0x3, 0x800) 13:28:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000002f80)={0x2, &(0x7f0000002f40)=[{}, {0x6}]}) 13:28:05 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 320.705765][ T35] audit: type=1326 audit(1611149285.916:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10640 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 13:28:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:28:06 executing program 0: madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x12) mlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) 13:28:06 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 321.529568][ T35] audit: type=1326 audit(1611149286.736:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10640 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 [ 322.882024][ T9869] Bluetooth: hci5: command 0x0405 tx timeout 13:28:17 executing program 5: bpf$MAP_CREATE(0x4, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 13:28:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x7, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:28:17 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 13:28:17 executing program 3: r0 = getpgid(0x0) process_vm_writev(r0, &(0x7f0000000380)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1, &(0x7f0000000780)=[{&(0x7f0000000400)=""/107, 0x6b}, {&(0x7f0000000480)=""/193, 0x7fffef95}], 0x2, 0x0) 13:28:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @any, 0x1}, 0xe) 13:28:18 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:18 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000633377", 0x0, 0x100, 0x6000000000000000}, 0x28) 13:28:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:28:18 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000007800)={0x0, 0x0, 0x0}, 0x0) 13:28:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1c, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x1f, 0xf00, 0x6, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x40) 13:28:18 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:18 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:28:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"/2623], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x32, 0x0, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7907080594e5d04e0d86077933b474b67b", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:28:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@tipc=@name, 0x80, 0x0}, 0x0) 13:28:18 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x8}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:18 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:28:18 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:18 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f0000000080), 0x2cb) close(r0) 13:28:19 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) 13:28:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:19 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r0, &(0x7f0000002280)={0x0, 0x53, 0x0, 0x0, 0x0, 0x1e}, 0x10040) 13:28:19 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:19 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:28:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000480)="2e00000014008502000000000000002e020200e22c000000160002808fb3d85ac77948f328995a017c7b58510600", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 13:28:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:20 executing program 0: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005b40)='./cgroup/syz1\x00', 0x1ff) 13:28:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x3, &(0x7f0000000300)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_ext={0x1c, 0x0, &(0x7f0000000080)=@framed={{}, [@btf_id, @ldst, @map]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00), 0x0, 0x10, &(0x7f0000000c40)}, 0x9a) 13:28:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:28:20 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 334.928148][T10736] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 13:28:20 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000003c80)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f00000000c0)="8e2f1d29bce97904ff30da37694606dcbf7ed239071b4dff5cceebe916e21d4a6e6f462730b7429914807a6089a6126174ff0e5491191edfbe377a9075f2988baac91347fa1cee019fb99de2843db275c481acc59222b498786f70deca7c222ac40581a1514cce1d9f3afc526632341bb156bb7f8b595640c5e1c38818d09ca0667b072fc2e8f05d1e0d7ad46d4fbbc9bc98b86dcf758161dbc5bd8190e627779632f19477248483e016c4640367e98aaf65d2c4442e22b60f9680c58959fa42f0157526864c84cbc1711e2134ea3f", 0xcf}, {&(0x7f00000001c0)="4e888250957d7def4319406c976312bdbf63a0f66459deff95a6f809bc9e55d072ae57282f0274d5b72ffcfd01f8e6bee31e11d48448d41ca71c149f850d24f0c16a448a2aaea441db83c890bf535c2452403845bf7975c2d6d3b0020dbf45c01809608f205530c32e4c637541f201edfb86936640bb92fb0e992ee0ea0f7b735032a34c18affb9f0c0e7cd46c90e30d43ba1d656aeb948486fe64daf12e6f1608ec7cbcfc3001b0df6debbb7facc302019924f7bd19eeeb77b83547f9e76b8e40f4b4740db7270e9a3ad35a591a49474edd7a85b882bdb5ba22655230e94deff967ccc0e6033d25d8fc3324", 0xec}, {&(0x7f00000002c0)="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", 0xd06}], 0x3}, 0x0) recvmsg(r1, &(0x7f0000001280)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f0000001380)=""/205, 0xcd}, 0x40000040) 13:28:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 13:28:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x10}, 0x40) 13:28:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:28:20 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x70) 13:28:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x1f, 0x1400, 0x500}, 0x40) 13:28:20 executing program 0: perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:28:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:28:20 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:20 executing program 5: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:21 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:21 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:21 executing program 5: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:21 executing program 0: socketpair(0x23, 0x0, 0x83010000, &(0x7f0000000140)) 13:28:21 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x26d, &(0x7f00000006c0)='bdev!)-%+wlan\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;YE\xec\x8c;\xf7\xcc\xa7\x8b6\xff\xff\xff\x01fE\xaea\x10\x8f\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1c\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&8\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k\x8c\x1dTi\xafq\xde\x06/ \x93O.\xe5<0\xfa\b\x82\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xdf5\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2P\xe6\x98w\xf4\xae{\xbb#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x14\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00'/621}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0xffa7) 13:28:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:21 executing program 5: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:21 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(0x0, 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:21 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:21 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d00)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002280)={0x0, 0x0, 0x0, 0x64}, 0x0) 13:28:21 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(0x0, 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:21 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:22 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:22 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x30}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x26d, &(0x7f00000006c0)='bdev!)-%+wlan\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;YE\xec\x8c;\xf7\xcc\xa7\x8b6\xff\xff\xff\x01fE\xaea\x10\x8f\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1c\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&8\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k\x8c\x1dTi\xafq\xde\x06/ \x93O.\xe5<0\xfa\b\x82\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xdf5\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2P\xe6\x98w\xf4\xae{\xbb#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x14\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00'/621}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0xffa7) 13:28:22 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(0x0, 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:22 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:22 executing program 3: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x1f, 0xf00, 0x6, 0x0, 0xffffffffffffffff, 0x0, [0xc0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0xd5772d91382a7a6b}, 0x38) 13:28:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:23 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:23 executing program 3: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f00000000c0)=""/229, 0x26, 0xe5, 0x1}, 0x20) 13:28:23 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) 13:28:23 executing program 1: getresuid(&(0x7f0000002500), &(0x7f0000002540), &(0x7f0000002580)) 13:28:23 executing program 5: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, 0x0, 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:23 executing program 3: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:23 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:23 executing program 0: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x21890}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x29b000) 13:28:24 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, 0x0, 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:24 executing program 5: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:24 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:24 executing program 1: clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000140)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, 0x0, &(0x7f0000000180)) r3 = getpid() tkill(r3, 0x4) exit(0x0) 13:28:24 executing program 0: clone(0xf38055be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) exit(0x0) 13:28:24 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, 0x0, 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:24 executing program 5: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:24 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 339.347153][T10883] IPVS: ftp: loaded support on port[0] = 21 13:28:24 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:24 executing program 5: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:28:24 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='comm\x00') 13:28:25 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 340.187638][T10883] IPVS: ftp: loaded support on port[0] = 21 13:28:28 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:28 executing program 5: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:28:28 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xc) 13:28:28 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:28 executing program 0: clone(0xf38055be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) exit(0x0) 13:28:28 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:28 executing program 5: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:28:28 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, 0x0) 13:28:28 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 343.603728][T10979] IPVS: ftp: loaded support on port[0] = 21 13:28:29 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) fsetxattr(r0, 0x0, 0x0, 0x0, 0x0) 13:28:29 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:29 executing program 1: madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x6) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 13:28:29 executing program 0: semget(0x0, 0x0, 0x204) 13:28:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:29 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:29 executing program 1: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 13:28:29 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x5c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:29 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:29 executing program 1: setgid(0xffffffffffffffff) r0 = getegid() setregid(r0, 0x0) 13:28:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x4}, 0x40) 13:28:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:30 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:30 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:30 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000005c0)='g', 0x1, 0x100000000}]) 13:28:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001ec0)={0x0, 0x0, 0x0}, 0x0) 13:28:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x2c}}, 0x0) 13:28:30 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 345.106349][T11058] loop1: detected capacity change from 264192 to 0 13:28:30 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:30 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:28:30 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x1800) 13:28:30 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 345.302579][T11058] loop1: detected capacity change from 264192 to 0 13:28:30 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20c0, 0x0) 13:28:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x14, r1, 0x6d88fd021dd293e9}, 0x14}}, 0x0) 13:28:30 executing program 4: bpf$MAP_CREATE(0xb, &(0x7f00000000c0), 0x40) 13:28:30 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:31 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:28:31 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:31 executing program 4: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) 13:28:31 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @none}, 0xe) 13:28:31 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:28:31 executing program 1: ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) 13:28:31 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:31 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setresuid(0x0, 0x0, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:31 executing program 4: add_key$fscrypt_v1(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000200)={0x0, "b74f51eb27d0f490341a8198aaf25eb50f01bc5f38acf3d11c9afe89e60b55474d65c2c7e38d79224097216cb2e80e0f2b8e0e6bb30b1ce4b29bc3f5e0f837b6"}, 0x48, 0x0) 13:28:31 executing program 0: select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x200}, 0x0) 13:28:31 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:28:31 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000040)={0x0, 0xa, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "945d01d5"}, 0x0, 0x0, @planes=0x0, 0x800}) 13:28:31 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:31 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 13:28:31 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setresuid(0x0, 0x0, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000980)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 13:28:31 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:28:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 13:28:32 executing program 4: pselect6(0x40, &(0x7f0000000000)={0x5}, &(0x7f0000000040)={0x6}, 0x0, 0x0, &(0x7f00000001c0)={0x0}) 13:28:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:32 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000380)) 13:28:32 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setresuid(0x0, 0x0, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:32 executing program 1: syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/dsp\x00', 0x0, 0x0) 13:28:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:32 executing program 4: init_module(&(0x7f00000000c0)='\x00i\xe7\xd4\xc5+\xc8\x1c=}\x9e\xc4\xf2\x84\xb3?\x9f\x90\xea\x04L\x1f\x80n\x0f\xfdml\xc8\xc8\x84\x1d\x02N\xa1a\xdb\xf0\x16\x80C\xd1\x95\x05\xe4(> W\t6\xd0\xe7U\xbf9*\xc3\xb9g}JQ\xec\x04\x7f\x19*\xfc\xc6\x92Qw\xaa\xf0,\xb3\xf1C(\xf4a^\xc3\xf3\x13\xa9\xa2F\xf4\xc4\xf6t6p\xdc_\xc4\x94\xe5K\xd6N\n\xb2\xbf+Y\x8b\xc0\xe8\xefy{\x95]{I\xef\xa3ta\xc4\xca\x06\xd9s\x02Y\xaf\xb3\xc4 \xec\x00\xae\x95)$\x13\xa2\x190\x0f9\xc1\xb4\xffRs<\x9c:O\x84\xe0\xf9\xf8B\x91u\xb2', 0xa2, 0x0) 13:28:32 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003ec0)=[{{&(0x7f0000003000)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0}}], 0x1, 0x0) [ 347.308129][T11148] Module has invalid ELF header 13:28:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 347.337016][T11148] Module has invalid ELF header 13:28:32 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x28}}, 0x0) 13:28:32 executing program 4: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000002340)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, 0x0) 13:28:32 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:32 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0xa, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1403dcbd"}, 0x0, 0x0, @planes=&(0x7f0000000100)={0x0, 0x0, @userptr}}) 13:28:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:32 executing program 1: socketpair(0x31, 0x0, 0x0, &(0x7f0000000000)) 13:28:33 executing program 4: socketpair(0x26, 0x0, 0x0, &(0x7f0000000140)) 13:28:33 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:33 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:33 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:33 executing program 0: process_vm_writev(0x0, &(0x7f0000001440)=[{&(0x7f0000000000)=""/52, 0x34}], 0x1, &(0x7f0000002980)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 13:28:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000068c0), 0x4) 13:28:33 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 13:28:33 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:33 executing program 0: bpf$MAP_CREATE(0xb, &(0x7f0000000080), 0x40) 13:28:33 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:33 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:33 executing program 1: bpf$MAP_CREATE(0x2, &(0x7f00000000c0), 0x40) 13:28:33 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:33 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0) 13:28:33 executing program 0: syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x1a9182) 13:28:33 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:33 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setresuid(0x0, 0x0, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB='\t'], 0x14}}, 0x0) 13:28:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:28:33 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:34 executing program 0: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/nvme-fabrics\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, 0x0) 13:28:34 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:34 executing program 1: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xffffffffffffff84, 0x410001) 13:28:34 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, 0x0) 13:28:34 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:34 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setresuid(0x0, 0x0, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:34 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, &(0x7f00000005c0)) 13:28:34 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:34 executing program 1: syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x9, 0x0) [ 349.255477][ T35] audit: type=1400 audit(1611149314.465:13): avc: denied { ioctl } for pid=11223 comm="syz-executor.4" path="socket:[36778]" dev="sockfs" ino=36778 ioctlcmd=0x43c9 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=sock_file permissive=1 13:28:34 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 13:28:34 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setresuid(0x0, 0x0, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:34 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) 13:28:34 executing program 1: clock_gettime(0x7, &(0x7f0000000840)) 13:28:34 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:34 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:34 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) connect$l2tp(r0, 0x0, 0x0) 13:28:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0x64010102}}, 0x80) 13:28:35 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:35 executing program 4: syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x0) 13:28:35 executing program 1: shmget(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 13:28:35 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:35 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000e40)={@local, @dev}, 0xc) 13:28:35 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x0, 0x2, &(0x7f00000006c0)=[{&(0x7f0000000240)='Q', 0x1}, {&(0x7f00000005c0)='g', 0x1, 0x100000000}]) 13:28:35 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 13:28:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:35 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:35 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:28:35 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:35 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 350.524369][T11279] loop1: detected capacity change from 264192 to 0 13:28:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:35 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x5451, 0x0) 13:28:35 executing program 4: socket$inet6_dccp(0xa, 0x6, 0x0) 13:28:35 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:36 executing program 1: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x385242, 0x0) 13:28:36 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:28:36 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x800, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x0, 0x2, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "463f63d6"}, 0x0, 0x0, @userptr}) [ 350.930631][ T35] audit: type=1400 audit(1611149316.135:14): avc: denied { create } for pid=11301 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 13:28:36 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:36 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, &(0x7f0000000080)="b6", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) 13:28:36 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 13:28:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={0x0}}, 0x0) 13:28:36 executing program 0: clock_gettime(0x76435ef1a0a3d136, 0x0) 13:28:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:36 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:36 executing program 4: socketpair(0x0, 0xf, 0x0, &(0x7f0000000200)) 13:28:36 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 13:28:36 executing program 1: waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) 13:28:36 executing program 0: bpf$MAP_CREATE(0xd, &(0x7f0000000080), 0x40) 13:28:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:28:37 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)) 13:28:37 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:28:37 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 13:28:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x24}}, 0x0) 13:28:37 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:37 executing program 4: bpf$MAP_CREATE(0x2, 0x0, 0x0) 13:28:37 executing program 1: bpf$MAP_CREATE(0x8, &(0x7f0000000080), 0x40) 13:28:37 executing program 0: bpf$MAP_CREATE(0x9, &(0x7f0000000080), 0x40) 13:28:37 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 13:28:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:37 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:37 executing program 4: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x6, 0x200080) 13:28:37 executing program 1: bpf$MAP_CREATE(0x13, &(0x7f0000000080), 0x40) 13:28:37 executing program 0: socket$inet(0x2, 0x5, 0x8) 13:28:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, 0x0, &(0x7f0000000280)) 13:28:37 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:28:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:37 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 13:28:38 executing program 1: pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x2}, &(0x7f00000001c0)={0x0, 0x3938700}, 0x0) 13:28:38 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x61c100, 0x0) 13:28:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:38 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:38 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 13:28:38 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$bt_l2cap(r0, 0x0, 0x0) 13:28:38 executing program 4: unshare(0x400) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 13:28:38 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc058565d, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6abf3ae9"}, 0x0, 0x0, @planes=0x0}) 13:28:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:38 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6}, 0x40) 13:28:38 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000012c0)='./cgroup/syz1\x00', 0x200002, 0x0) 13:28:38 executing program 4: io_uring_setup(0x57b, &(0x7f0000000000)={0x0, 0x0, 0x20}) 13:28:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:38 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_THP_DISABLE(0x2a, 0x0) 13:28:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) 13:28:39 executing program 1: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x3, 0x200) 13:28:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001017fd"], 0x2c}}, 0x0) 13:28:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001ec0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000001e80)={&(0x7f0000000800)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_SOPASS={0xdd, 0x3, "0eb2e61bd438a253124f06307c200488ff51c53f0752b96fb6e678dd0b77065956a6d3e8b913654bae9d4a22d86fd80dbc71f00bcb8861d91a0e738e603979c46f2ed6cc34a14fd6efb1b6b59c7df738b2cf7060663ac955c9336a2e3ea1cf86a36a0f635523e1bf063417b6c4c04bb2743999ff9dcc58abe52c2e097f838c258be6f937b854870be60b89c93bfde5db4fd454de2022e7f6756169bd9668b39f7a0bf78fca606a780c47ca4059946901fca37fd072317afc3ca75eb14f1248ef18bfd5361ace01cae4f4c8fc8768ef3dc05533cc2044be9f08"}, @ETHTOOL_A_WOL_MODES={0x1c4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xf5, 0x4, "47db10372ac1dd6a1248213d2e070c7b27897efeadf48d7ee44a08ca8bfcf70161b3f18d53698b7a6375af859abd5a091fdab603e5c4aaf1a9ecd9361e59090745591afa5579eb13e83f5548f62ef81dea394640c4a51329f750c9f2aea7fe718e9854a6752c4ec49a24b6cb293c07da67d8aa170282f1f3b386ec998bbad312ffe715b6d3e4f8f0a7a9ef888ad166897208b88af4ad612f0e567907c98df95e6ee21f1d399c18695b263276c41e9373d977a7a2cb71deb44bfc7a4f01b64692095937a51e428e0186be4fb6511c5882003047bce4c4ee5388771cbd65c5c0ab6d0db507ebb6c7c0a1fca47c836a7d99c2"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0xbd, 0x4, "fa1ec6d82f1a156d7e2076d26a92f98346c6e48853121f3c907a8f0876caabe8a6f77f6817627856cff910a27203021a91dbf6c683fed73d3aa018eda6890840e0bf51dafb87b7e69f4e1b4253f63cafc7b7f2dfb41f416f161b292284c7e1deffe419e1b894873bb76d5a3fe3198e9ca02a511f20dc44e1335f00c47d0f57db120a2bbd6709b36e14b80eebeb51fadb64b956cc9c4cc10367ae03462e5eb91f9dd75366273fd0399ee6633579ba98c4e6d0bb3a2cac2b78a3"}]}, @ETHTOOL_A_WOL_MODES={0xc08, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xc04, 0x4, "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"}]}, @ETHTOOL_A_WOL_HEADER={0x4}]}, 0xec4}}, 0x0) 13:28:39 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:28:39 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000380)=@ax25={{}, [@netrom, @bcast, @netrom, @rose, @remote, @null, @default, @null]}, 0x80, &(0x7f0000000700)=[{0x0}, {0x0}], 0x2}, 0x0) 13:28:39 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nvram\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) splice(r0, 0x0, r1, 0x0, 0x1ff, 0x0) 13:28:39 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:28:39 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, &(0x7f00000003c0)) 13:28:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x7}, 0x40) 13:28:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:39 executing program 4: mq_unlink(&(0x7f0000000040)='/dev/vcsu#\x00') 13:28:39 executing program 1: syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x0, 0x115241) 13:28:39 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:28:39 executing program 0: bpf$MAP_CREATE(0xd, &(0x7f00000000c0), 0x40) 13:28:39 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0xfffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 13:28:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:28:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000900)={0xa1}, 0x88) 13:28:39 executing program 2: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nvme-fabrics\x00', 0xc0001, 0x0) 13:28:39 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x4020940d, &(0x7f0000000240)) 13:28:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'team_slave_1\x00'}, 0x18) 13:28:40 executing program 1: ioprio_set$uid(0x0, 0x0, 0x4004) 13:28:40 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3938700}, 0x0) 13:28:40 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8}, 0xc) 13:28:40 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200), 0x8}) 13:28:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:28:40 executing program 3: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x400000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) clock_getres(0x0, 0x0) 13:28:40 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0x4]}, 0x8}) 13:28:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:28:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 13:28:40 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video37\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 13:28:40 executing program 2: socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/nvme-fabrics\x00', 0x200, 0x0) 13:28:40 executing program 3: socket(0x0, 0x0, 0x0) openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(0xffffffffffffffff, 0x8004500b, 0x0) socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000800)='/dev/vcsu#\x00', 0x0, 0x303002) 13:28:40 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80040, 0x0) 13:28:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000025c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000002640)={&(0x7f0000002600)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:28:40 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000004440)) 13:28:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:28:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f00000001c0)={'sit0\x00', 0x0}) 13:28:40 executing program 2: r0 = socket(0x11, 0x3, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) 13:28:41 executing program 4: add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'fscrypt:'}, &(0x7f0000000100)={0x0, "4df8650cef979132703ab6dd4f9b6897cc6051de3cd44ca1b44c7d2d6355e0fdeeed5d1a842f01dbe0b48d5b6f8bed8c823cd368aca16ebfa5fce4fbf8273090"}, 0x48, 0xfffffffffffffffb) 13:28:41 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)) 13:28:41 executing program 5: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040)='NLBL_CALIPSO\x00') 13:28:41 executing program 1: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x10d002) 13:28:41 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0xc0189436, 0x0) 13:28:41 executing program 2: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), 0x0) 13:28:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x3, 0x0, 0x0, 0xdb}]}) 13:28:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xffffff58) 13:28:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) 13:28:41 executing program 1: openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x2, 0x0) 13:28:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001ec0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000001e80)={0x0}}, 0x0) 13:28:41 executing program 2: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xffffffffffffffff, 0x0) 13:28:41 executing program 4: bpf$MAP_CREATE(0x5, &(0x7f0000000080), 0x40) 13:28:41 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) 13:28:41 executing program 5: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) 13:28:41 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0xc0189436, &(0x7f0000000240)) 13:28:41 executing program 1: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000000)=""/187) 13:28:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001ec0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000001e80)={&(0x7f0000000800)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_SOPASS={0xdd, 0x3, "0eb2e61bd438a253124f06307c200488ff51c53f0752b96fb6e678dd0b77065956a6d3e8b913654bae9d4a22d86fd80dbc71f00bcb8861d91a0e738e603979c46f2ed6cc34a14fd6efb1b6b59c7df738b2cf7060663ac955c9336a2e3ea1cf86a36a0f635523e1bf063417b6c4c04bb2743999ff9dcc58abe52c2e097f838c258be6f937b854870be60b89c93bfde5db4fd454de2022e7f6756169bd9668b39f7a0bf78fca606a780c47ca4059946901fca37fd072317afc3ca75eb14f1248ef18bfd5361ace01cae4f4c8fc8768ef3dc05533cc2044be9f08"}, @ETHTOOL_A_WOL_MODES={0x1e0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xf5, 0x4, "47db10372ac1dd6a1248213d2e070c7b27897efeadf48d7ee44a08ca8bfcf70161b3f18d53698b7a6375af859abd5a091fdab603e5c4aaf1a9ecd9361e59090745591afa5579eb13e83f5548f62ef81dea394640c4a51329f750c9f2aea7fe718e9854a6752c4ec49a24b6cb293c07da67d8aa170282f1f3b386ec998bbad312ffe715b6d3e4f8f0a7a9ef888ad166897208b88af4ad612f0e567907c98df95e6ee21f1d399c18695b263276c41e9373d977a7a2cb71deb44bfc7a4f01b64692095937a51e428e0186be4fb6511c5882003047bce4c4ee5388771cbd65c5c0ab6d0db507ebb6c7c0a1fca47c836a7d99c2"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0xd9, 0x4, "fa1ec6d82f1a156d7e2076d26a92f98346c6e48853121f3c907a8f0876caabe8a6f77f6817627856cff910a27203021a91dbf6c683fed73d3aa018eda6890840e0bf51dafb87b7e69f4e1b4253f63cafc7b7f2dfb41f416f161b292284c7e1deffe419e1b894873bb76d5a3fe3198e9ca02a511f20dc44e1335f00c47d0f57db120a2bbd6709b36e14b80eebeb51fadb64b956cc9c4cc10367ae03462e5eb91f9dd75366273fd0399ee6633579ba98c4e6d0bb3a2cac2b78a3d5eaa1a49aeac815294e975382267b3143352d1f7217acccd2ae00d8"}]}, @ETHTOOL_A_WOL_MODES={0xbe8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xbe2, 0x4, "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"}]}, @ETHTOOL_A_WOL_MODES={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0xec4}}, 0x0) 13:28:42 executing program 4: r0 = syz_open_dev$ndb(&(0x7f00000016c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, 0x0) 13:28:42 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f0000000100)) 13:28:42 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@private0}}, &(0x7f0000000100)=0xfffffffffffffeba) 13:28:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x8f) 13:28:42 executing program 3: syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) 13:28:42 executing program 2: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.subtree_control\x00', 0x2, 0x0) 13:28:42 executing program 4: syz_open_dev$vcsu(&(0x7f0000000300)='/dev/vcsu#\x00', 0x0, 0x40) syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001ec0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000001e80)={&(0x7f0000000800)={0x14}, 0x14}}, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/dsp\x00', 0x0, 0x0) 13:28:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:42 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000040)={0x980000, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980920, 0x0, [], @value64}}) 13:28:42 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000380)=@ax25={{}, [@netrom, @bcast, @netrom, @rose, @remote, @null, @default, @null]}, 0x80, 0x0}, 0x0) 13:28:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x20}}, 0x0) 13:28:42 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000800)='/dev/vcsu#\x00', 0x0, 0x303002) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, 0x0) 13:28:42 executing program 5: setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @multicast1}}}, 0xfffffffffffffd8c) 13:28:42 executing program 4: syz_open_dev$vcsu(&(0x7f0000000300)='/dev/vcsu#\x00', 0x0, 0x40) syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001ec0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000001e80)={&(0x7f0000000800)={0x14}, 0x14}}, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/dsp\x00', 0x0, 0x0) 13:28:42 executing program 1: select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 13:28:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000004c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x0) 13:28:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed={[], 0x11}, 0x6}, 0xe) 13:28:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x8}]}) 13:28:43 executing program 4: syz_open_dev$vcsu(&(0x7f0000000300)='/dev/vcsu#\x00', 0x0, 0x40) syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001ec0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000001e80)={&(0x7f0000000800)={0x14}, 0x14}}, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/dsp\x00', 0x0, 0x0) 13:28:43 executing program 5: syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) 13:28:43 executing program 1: socketpair(0x28, 0x0, 0x0, &(0x7f0000000700)) 13:28:43 executing program 0: clock_gettime(0x0, &(0x7f0000004400)) 13:28:43 executing program 2: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, &(0x7f00000000c0)=0x80) 13:28:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x40, @none}, 0xe) 13:28:43 executing program 4: syz_open_dev$vcsu(&(0x7f0000000300)='/dev/vcsu#\x00', 0x0, 0x40) syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001ec0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000001e80)={&(0x7f0000000800)={0x14}, 0x14}}, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/dsp\x00', 0x0, 0x0) 13:28:43 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, 0x0, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @bcast]}, 0x40) 13:28:43 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x100000000}]) 13:28:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 13:28:43 executing program 0: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x3, 0x0) 13:28:43 executing program 3: process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:28:43 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r0, 0x80044dfd, &(0x7f0000000180)) [ 358.416496][T11620] loop1: detected capacity change from 264192 to 0 13:28:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, &(0x7f00000001c0)) 13:28:43 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000300)) 13:28:43 executing program 5: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvme-fabrics\x00', 0x64001, 0x0) 13:28:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x2c}}, 0x0) 13:28:43 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) 13:28:44 executing program 0: getcwd(&(0x7f0000000140)=""/147, 0x93) 13:28:44 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, 0x0) 13:28:44 executing program 4: syz_open_dev$ndb(&(0x7f00000016c0)='/dev/nbd#\x00', 0x0, 0xa800) 13:28:44 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='ip6tnl0\x00', r0) 13:28:44 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000000140)={0x0}) 13:28:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="0902020000000000000005"], 0x14}}, 0x0) 13:28:44 executing program 0: bpf$MAP_CREATE(0x14, &(0x7f0000000080), 0x40) 13:28:44 executing program 4: syz_open_dev$ndb(&(0x7f0000000a00)='/dev/nbd#\x00', 0x0, 0xc8a82) 13:28:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001e80)={0x0}}, 0x0) 13:28:44 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x40049409, 0x0) 13:28:44 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 13:28:44 executing program 4: bpf$MAP_CREATE(0xc, &(0x7f00000000c0), 0x40) 13:28:44 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000100)='\v', 0x1, 0xd4, &(0x7f0000000180)={0x2, 0x0, @private=0xa010102}, 0x10) 13:28:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xa54, 0xffffffffffffffff, 0x7}, 0x40) 13:28:44 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000001300)=[{&(0x7f0000000040)="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", 0x1fd, 0x3}]) 13:28:44 executing program 1: r0 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x100800) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000100)) sendmsg$nfc_llcp(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x27, 0x0, 0x0, 0x2, 0x80, 0x31, "4ce4dfa2b680e4e465f9987240f7bb3f3d91efada2eff015f49d01d79faee6da446127d316d631847bbb6703fbffb833f5852c559e8db2c4bff29569c9a9a0", 0x29}, 0x60, &(0x7f0000000300)=[{0x0}], 0x1, &(0x7f0000000340)={0x98, 0x113, 0xffffffff, "74354041414810b9e5a6c3d2b2a13bd172f56c85f56f951e9815ce2ed0e2ef1656cd074064efae8af8fe37a17f7cae5013b70f2a7abdd036d73029666737bc7d2d5408ce24c65fc830cd0e0f2f6007fcc2cd2a1cb895ce8acab0b5984f6d8f4bb4c1f1bfa201fc9b15d6e22b532ab5b863295480c53f6d8c55e7780852c6fdd85e370a0096"}, 0x98, 0x8080}, 0x8000) accept4$nfc_llcp(r0, &(0x7f0000000440), 0x0, 0x0) syz_open_dev$amidi(0x0, 0xfffffffffffffffe, 0x400000) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) sync() sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000001140)=[{&(0x7f0000000f00)={0x27, 0x0, 0x0, 0x5, 0x0, 0x2, "efd38664c96a5570928bc6a44364fb2249e136181757a3e409e35b2d2c9f9e547190295742822e8bed723df395a7567d48633310c097b6f7a5660b3fee6b2c"}, 0x60, &(0x7f0000001080)=[{0x0}], 0x1}], 0x1, 0x0) [ 359.800806][T11681] loop5: detected capacity change from 1 to 0 [ 359.883133][T11681] Dev loop5: unable to read RDB block 1 [ 359.894761][T11681] loop5: unable to read partition table [ 359.915172][T11681] loop5: partition table beyond EOD, truncated [ 359.953488][T11681] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 360.033520][T11681] loop5: detected capacity change from 1 to 0 13:28:45 executing program 2: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380)='/dev/adsp1\x00', 0x121000, 0x0) 13:28:45 executing program 4: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000001e00)='/dev/nvme-fabrics\x00', 0x10000, 0x0) 13:28:45 executing program 3: bpf$MAP_CREATE(0xa, &(0x7f00000000c0), 0x40) 13:28:45 executing program 0: socketpair(0xa, 0x3, 0x0, &(0x7f00000001c0)) 13:28:45 executing program 1: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) [ 360.084862][T11681] Dev loop5: unable to read RDB block 1 [ 360.091556][T11681] loop5: unable to read partition table [ 360.114888][T11681] loop5: partition table beyond EOD, truncated [ 360.138040][T11681] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 13:28:45 executing program 5: syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x4, 0x0) 13:28:45 executing program 4: openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 360.350036][ T4885] Dev loop5: unable to read RDB block 1 [ 360.368938][ T4885] loop5: unable to read partition table 13:28:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000000)={@mcast1}) 13:28:45 executing program 1: select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x200}, &(0x7f00000000c0)) [ 360.392275][ T4885] loop5: partition table beyond EOD, truncated 13:28:45 executing program 2: process_vm_writev(0x0, &(0x7f0000001440)=[{&(0x7f0000000000)=""/52, 0x34}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000002980)=[{&(0x7f0000001500)=""/66, 0x42}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 13:28:45 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0xf4240) 13:28:45 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @none, 0x7f}, 0xe) 13:28:45 executing program 5: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x40, 0x0) 13:28:45 executing program 1: r0 = socket(0x11, 0x3, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) 13:28:45 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000006c0)=[{&(0x7f00000005c0)='g', 0x1, 0x100000000}]) 13:28:46 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0x5421, 0xffffffffffffffff) 13:28:46 executing program 0: r0 = getpgrp(0x0) get_robust_list(r0, &(0x7f00000009c0)=0x0, &(0x7f0000000840)) 13:28:46 executing program 4: r0 = socket(0x11, 0x3, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={0x0, 0x2c}}, 0x0) 13:28:46 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x0, 0x6}) 13:28:46 executing program 1: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, r0) [ 361.160543][T11731] loop3: detected capacity change from 264192 to 0 13:28:46 executing program 2: add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'fscrypt:', @auto=[0x0, 0x0, 0x0, 0x61]}, &(0x7f0000000100)={0x0, "4df8650cef979132703ab6dd4f9b6897cc6051de3cd44ca1b44c7d2d6355e0fdeeed5d1a842f01dbe0b48d5b6f8bed8c823cd368aca16ebfa5fce4fbf8273090"}, 0x48, 0xfffffffffffffffb) 13:28:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x44}}, 0x0) 13:28:46 executing program 0: socket(0x11, 0x3, 0xd1) 13:28:46 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000280)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) 13:28:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_AF={0x6}]}]}, 0x28}}, 0x0) 13:28:46 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000340)={0x0}) 13:28:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', 0x0}) 13:28:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, 0x0) 13:28:46 executing program 1: socket(0x1d, 0x0, 0x401) 13:28:46 executing program 3: sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380)='/dev/adsp1\x00', 0x121000, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) syz_open_dev$vcsu(&(0x7f0000000800)='/dev/vcsu#\x00', 0x0, 0x303002) 13:28:46 executing program 2: shmat(0x0, &(0x7f0000ff8000/0x7000)=nil, 0x0) 13:28:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x400}) 13:28:46 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 13:28:47 executing program 1: socket$inet6(0xa, 0x0, 0x8ac6) 13:28:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000ec0)) 13:28:47 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @bcast}, 0x1c) 13:28:47 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$input_event(r0, 0x0, 0x0) 13:28:47 executing program 3: request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='ip6tnl0\x00', 0x0) 13:28:47 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'fscrypt:', @auto=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, 0x38]}, &(0x7f0000000100)={0x0, "4df8650cef979132703ab6dd4f9b6897cc6051de3cd44ca1b44c7d2d6355e0fdeeed5d1a842f01dbe0b48d5b6f8bed8c823cd368aca16ebfa5fce4fbf8273090"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, r0) 13:28:47 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000340)={@none}) 13:28:47 executing program 4: syz_emit_ethernet(0xe81, &(0x7f0000000140)={@remote, @random="151931c12618", @val={@void, {0x8100, 0x0, 0x1}}, {@mpls_uc={0x8847, {[], @ipv4=@igmp={{0x5, 0x4, 0x0, 0x0, 0xe6f, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, 0x0, 0x0, @private, "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"}}}}}}, 0x0) 13:28:47 executing program 2: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x35d2623d, 0x64000) 13:28:47 executing program 0: bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x4}, 0x25) 13:28:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x1) 13:28:47 executing program 5: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, 0x0) 13:28:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x9, @fixed, 0x6}, 0xe) 13:28:47 executing program 1: waitid(0x1, 0x0, &(0x7f0000000400), 0x2, 0x0) 13:28:47 executing program 2: socketpair(0x9, 0x0, 0x0, &(0x7f00000003c0)) 13:28:47 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x5421, 0x0) 13:28:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1126, 0xffffffffffffffff, 0x3a9e}, 0x40) 13:28:47 executing program 3: syz_open_dev$ndb(&(0x7f0000000500)='/dev/nbd#\x00', 0x0, 0x450000) 13:28:48 executing program 4: syz_open_dev$vcsu(&(0x7f00000009c0)='/dev/vcsu#\x00', 0x0, 0x40000) 13:28:48 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0x0, 0x6, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, [], @value64}}) 13:28:48 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x5452, &(0x7f0000000240)) 13:28:48 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x10) 13:28:48 executing program 3: bpf$MAP_CREATE(0x2, &(0x7f0000000080), 0x40) 13:28:48 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x0, 0xd35}, 0xc) 13:28:48 executing program 1: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/nvme-fabrics\x00', 0x200, 0x0) 13:28:48 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x74, @fixed}, 0xe) 13:28:48 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) syz_open_dev$ndb(&(0x7f0000000280)='/dev/nbd#\x00', 0x0, 0x0) 13:28:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003ec0)=[{{&(0x7f0000003000)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}, 0x1c, &(0x7f0000003400)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0) 13:28:48 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) 13:28:48 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) recvmsg(r0, 0x0, 0x0) 13:28:48 executing program 4: sendto$rose(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 363.533884][T11842] block nbd2: NBD_DISCONNECT [ 363.547076][T11843] block nbd5: NBD_DISCONNECT 13:28:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) 13:28:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) [ 363.581771][T11842] block nbd2: NBD_DISCONNECT 13:28:48 executing program 5: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)) 13:28:48 executing program 2: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/nvme-fabrics\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 13:28:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1000000) 13:28:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 13:28:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x14, 0x0, 0xf9836b610b9865f3}, 0x14}}, 0x0) 13:28:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @rand_addr=0x64010100}}}, 0x88) 13:28:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x42) 13:28:49 executing program 4: shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 13:28:49 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080), 0x4) 13:28:49 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0xc0585611, &(0x7f0000000240)) 13:28:49 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000002480)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) 13:28:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000b40)={&(0x7f0000000a40), 0xc, &(0x7f0000000b00)={0x0}}, 0x0) 13:28:49 executing program 2: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x4000) 13:28:49 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x40) 13:28:49 executing program 4: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x22640, 0x0) 13:28:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000080)=0x14) 13:28:49 executing program 3: mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0x1, 0x9, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ff9000/0x3000)=nil, 0x3) 13:28:49 executing program 1: openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 13:28:49 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xfff}]) 13:28:49 executing program 5: socketpair(0x22, 0x0, 0x2, &(0x7f0000000200)) 13:28:49 executing program 4: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000002340)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r0, 0x7ab, 0x0) 13:28:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 13:28:50 executing program 3: ioprio_set$uid(0x0, 0xffffffffffffffff, 0x2000) [ 364.828953][T11907] loop2: detected capacity change from 15 to 0 13:28:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000e80), &(0x7f0000000ec0)=0x8) [ 364.944054][T11907] Dev loop2: unable to read RDB block 15 13:28:50 executing program 1: setfsuid(0xee01) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/pid_for_children\x00') [ 364.994770][T11907] loop2: unable to read partition table [ 365.000838][T11907] loop2: partition table beyond EOD, truncated [ 365.018552][T11907] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 13:28:50 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ashmem\x00', 0x4002, 0x0) 13:28:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x60, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @empty}}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x60}}, 0x0) 13:28:50 executing program 3: r0 = socket(0x11, 0x3, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x2c}}, 0x0) [ 365.112344][T11907] loop2: detected capacity change from 15 to 0 13:28:50 executing program 2: syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x4380) 13:28:50 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ashmem\x00', 0x4002, 0x0) 13:28:50 executing program 5: r0 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0)='SMC_PNETID\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r0, 0x1}, 0x14}}, 0x0) 13:28:50 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) 13:28:50 executing program 3: syz_genetlink_get_family_id$l2tp(0xfffffffffffffffd) 13:28:50 executing program 0: pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x2}, &(0x7f00000001c0)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0x4]}, 0x8}) 13:28:50 executing program 2: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/nvme-fabrics\x00', 0x0, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 13:28:50 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ashmem\x00', 0x4002, 0x0) 13:28:51 executing program 1: socketpair(0x1e, 0x0, 0x83, &(0x7f00000001c0)) 13:28:51 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x800, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6abf3ae9"}, 0x0, 0x0, @fd}) 13:28:51 executing program 3: socketpair(0x8, 0x0, 0x0, &(0x7f00000001c0)) 13:28:51 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, 0xffffffffffffffff) 13:28:51 executing program 0: bpf$MAP_CREATE(0x3, 0x0, 0x6f) 13:28:51 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x0, 0x2}) 13:28:51 executing program 5: clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, r0/1000+60000}) 13:28:51 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed, 0x6}, 0xe) 13:28:51 executing program 2: socketpair(0x3, 0x0, 0xffbffffd, &(0x7f0000000080)) 13:28:51 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000380)=@netrom) 13:28:51 executing program 1: getgroups(0x2, &(0x7f0000000000)=[0x0, 0xffffffffffffffff]) setfsgid(r0) 13:28:51 executing program 2: getresgid(&(0x7f0000000140), &(0x7f0000000180), 0x0) 13:28:51 executing program 0: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/nvme-fabrics\x00', 0x4415d5924b72db1, 0x0) 13:28:51 executing program 1: add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 13:28:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 13:28:51 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6abf3ae9"}, 0x0, 0x1, @planes=0x0}) 13:28:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind(r0, &(0x7f0000000080)=@nl=@unspec, 0x63) 13:28:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x2c}}, 0x0) 13:28:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x1c}}, 0x0) 13:28:52 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0405610, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6abf3ae9"}, 0x0, 0x0, @planes=0x0}) 13:28:52 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ashmem\x00', 0x4002, 0x0) 13:28:52 executing program 1: socketpair(0x28, 0x0, 0x0, &(0x7f0000000400)) 13:28:52 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 13:28:52 executing program 0: r0 = getpgid(0x0) ptrace$peek(0xffffffffffffffff, r0, 0x0) 13:28:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, 0x0, &(0x7f0000000100)) 13:28:52 executing program 2: socketpair(0x28, 0x0, 0xb79, &(0x7f0000000400)) 13:28:52 executing program 0: bpf$MAP_CREATE(0x12, &(0x7f0000000080), 0x40) 13:28:52 executing program 1: syz_open_dev$dri(&(0x7f0000001340)='/dev/dri/card#\x00', 0x0, 0x4300) 13:28:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 13:28:52 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 13:28:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x20000100) 13:28:53 executing program 1: clock_gettime(0x0, &(0x7f00000004c0)={0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={r0}) 13:28:53 executing program 5: clock_adjtime(0x0, &(0x7f0000000000)={0x5}) 13:28:53 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6abf3ae9"}, 0x0, 0x0, @planes=0x0}) 13:28:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 13:28:53 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x0, 0x9, 0x4}) 13:28:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000002cc0)={&(0x7f0000002bc0), 0xc, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="0902020000000000000005"], 0x14}}, 0x0) 13:28:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 13:28:53 executing program 0: pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x8}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={[0x4]}, 0x8}) 13:28:53 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x280101, 0x0) ioctl$SOUND_MIXER_INFO(r0, 0x805c4d65, 0x0) 13:28:53 executing program 4: socketpair(0x0, 0xf, 0x0, &(0x7f00000002c0)) [ 368.402013][ T34] Bluetooth: hci5: command 0x0405 tx timeout 13:28:53 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 13:28:53 executing program 0: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 13:28:54 executing program 1: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ocfs2_control\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, 0x0, 0x0) 13:28:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, 0x0, 0x0) 13:28:54 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000280)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x0) 13:28:54 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x2, &(0x7f0000000240)) 13:28:54 executing program 3: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x337d, 0x0) 13:28:54 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ashmem\x00', 0x0, 0x0) 13:28:54 executing program 2: request_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0) 13:28:54 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 13:28:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) 13:28:54 executing program 1: getresgid(&(0x7f0000000140), 0x0, 0x0) 13:28:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x891d, &(0x7f0000000000)={'syzkaller0\x00', @ifru_mtu}) 13:28:54 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0xb0040, 0x0) 13:28:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f00000003c0)='SMC_PNETID\x00') sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:28:54 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 13:28:54 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x5421, &(0x7f0000000240)) 13:28:54 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000006c0)={'syztnl2\x00', 0x0}) 13:28:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00', 0x7fff}) 13:28:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 13:28:54 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000000080), 0x40) 13:28:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto$rose(r0, 0x0, 0x0, 0x40001, 0x0, 0x0) 13:28:55 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x14}, 0x10) 13:28:55 executing program 0: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0xe04810f6b0711692, 0x0) 13:28:55 executing program 2: openat$misdntimer(0xffffffffffffff9c, 0x0, 0x402140, 0x0) 13:28:55 executing program 1: bpf$MAP_CREATE(0x2, &(0x7f0000000080), 0x200000c0) 13:28:55 executing program 4: syz_genetlink_get_family_id$ethtool(&(0x7f0000000180)='ethtool\x00') 13:28:55 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto$rose(r0, 0x0, 0x0, 0x40001, 0x0, 0x0) 13:28:55 executing program 5: bpf$MAP_CREATE(0x9, &(0x7f00000000c0), 0x40) 13:28:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @empty}}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6}]}]}, 0x3c}}, 0x0) 13:28:55 executing program 2: socketpair(0x1, 0x0, 0x7b, &(0x7f0000000000)) 13:28:55 executing program 1: request_key(&(0x7f0000000080)='logon\x00', 0x0, 0x0, 0x0) 13:28:55 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto$rose(r0, 0x0, 0x0, 0x40001, 0x0, 0x0) 13:28:55 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x5421, &(0x7f0000000240)) 13:28:55 executing program 0: bpf$MAP_CREATE(0xe, &(0x7f0000000080), 0x40) 13:28:55 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 13:28:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) 13:28:55 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000200)) 13:28:55 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto$rose(r0, 0x0, 0x0, 0x40001, 0x0, 0x0) 13:28:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @remote}}}}) 13:28:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:28:55 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000200)) 13:28:55 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @private=0xa010102}, 0x10) 13:28:56 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0xe40, 0x0) 13:28:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 13:28:56 executing program 5: r0 = gettid() sched_rr_get_interval(r0, &(0x7f0000000100)) 13:28:56 executing program 4: get_robust_list(0x0, 0x0, &(0x7f0000000840)) 13:28:56 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000200)) 13:28:56 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 13:28:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001e80)={&(0x7f0000000800)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_SOPASS={0xdd, 0x3, "0eb2e61bd438a253124f06307c200488ff51c53f0752b96fb6e678dd0b77065956a6d3e8b913654bae9d4a22d86fd80dbc71f00bcb8861d91a0e738e603979c46f2ed6cc34a14fd6efb1b6b59c7df738b2cf7060663ac955c9336a2e3ea1cf86a36a0f635523e1bf063417b6c4c04bb2743999ff9dcc58abe52c2e097f838c258be6f937b854870be60b89c93bfde5db4fd454de2022e7f6756169bd9668b39f7a0bf78fca606a780c47ca4059946901fca37fd072317afc3ca75eb14f1248ef18bfd5361ace01cae4f4c8fc8768ef3dc05533cc2044be9f08"}, @ETHTOOL_A_WOL_MODES={0x1f0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xf5, 0x4, "47db10372ac1dd6a1248213d2e070c7b27897efeadf48d7ee44a08ca8bfcf70161b3f18d53698b7a6375af859abd5a091fdab603e5c4aaf1a9ecd9361e59090745591afa5579eb13e83f5548f62ef81dea394640c4a51329f750c9f2aea7fe718e9854a6752c4ec49a24b6cb293c07da67d8aa170282f1f3b386ec998bbad312ffe715b6d3e4f8f0a7a9ef888ad166897208b88af4ad612f0e567907c98df95e6ee21f1d399c18695b263276c41e9373d977a7a2cb71deb44bfc7a4f01b64692095937a51e428e0186be4fb6511c5882003047bce4c4ee5388771cbd65c5c0ab6d0db507ebb6c7c0a1fca47c836a7d99c2"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0xe9, 0x4, "fa1ec6d82f1a156d7e2076d26a92f98346c6e48853121f3c907a8f0876caabe8a6f77f6817627856cff910a27203021a91dbf6c683fed73d3aa018eda6890840e0bf51dafb87b7e69f4e1b4253f63cafc7b7f2dfb41f416f161b292284c7e1deffe419e1b894873bb76d5a3fe3198e9ca02a511f20dc44e1335f00c47d0f57db120a2bbd6709b36e14b80eebeb51fadb64b956cc9c4cc10367ae03462e5eb91f9dd75366273fd0399ee6633579ba98c4e6d0bb3a2cac2b78a3d5eaa1a49aeac815294e975382267b3143352d1f7217acccd2ae00d88970cda35544f2206180ada5e2ef4df0"}]}, @ETHTOOL_A_WOL_MODES={0xbe0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xbd9, 0x4, "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"}]}]}, 0xec4}}, 0x0) 13:28:56 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4000, 0x0) 13:28:56 executing program 5: pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x8}, 0x0, &(0x7f00000001c0)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0x4]}, 0x8}) 13:28:56 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000200)) 13:28:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={0x0}}, 0x0) 13:28:56 executing program 0: syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x2202) 13:28:56 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @none, 0x7f, 0x1}, 0xe) 13:28:56 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_mreqsrc(r0, 0x0, 0x29, 0x0, &(0x7f00000005c0)) 13:28:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000005c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 13:28:56 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x0, 0x0) 13:28:56 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 13:28:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYRES16], 0x14}}, 0x0) 13:28:56 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000040)={'vlan0\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=0x0}}) 13:28:56 executing program 1: process_vm_writev(0x0, &(0x7f0000001440)=[{&(0x7f0000000000)=""/52, 0x34}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000002980)=[{&(0x7f0000001500)=""/66, 0x42}, {0x0}], 0x2, 0x0) 13:28:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}}, &(0x7f0000000280)=0x100) 13:28:57 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380)='/dev/adsp1\x00', 0x121000, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, &(0x7f00000003c0)) 13:28:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x16}, 0x40) 13:28:57 executing program 3: ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000200), 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000180)) 13:28:57 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x0, 0x16}) 13:28:57 executing program 0: openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) 13:28:57 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r0, 0x80044dfd, 0x0) 13:28:57 executing program 5: socketpair(0x1, 0x0, 0x6, &(0x7f0000000100)) 13:28:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000d80)) 13:28:57 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1ec000, 0x0) 13:28:57 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6abf3ae9"}, 0x0, 0x0, @planes=0x0}) 13:28:57 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/50) 13:28:57 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000a00)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 13:28:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'team_slave_1\x00'}, 0x18) 13:28:57 executing program 3: openat$dsp(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/dsp\x00', 0x0, 0x0) 13:28:57 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380)='/dev/adsp1\x00', 0x121000, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, &(0x7f00000003c0)=0xe3) 13:28:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000002800)={@private1}) 13:28:57 executing program 5: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) waitid(0x1, 0x0, &(0x7f0000000400), 0x2, 0x0) 13:28:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @empty}}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x44}}, 0x0) 13:28:57 executing program 4: bpf$MAP_CREATE(0x5, &(0x7f00000000c0), 0x40) 13:28:57 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_REMOVE_NOTIFICATION(r0, 0x7b0, 0x0) 13:28:58 executing program 0: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x1, 0x0, 0xee00, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 13:28:58 executing program 1: syz_open_dev$vcsu(&(0x7f0000000300)='/dev/vcsu#\x00', 0x0, 0x40) 13:28:58 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0xc020660b, 0x0) 13:28:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 13:28:58 executing program 2: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x103080) 13:28:58 executing program 3: select(0x40, &(0x7f0000000000), 0x0, 0x0, 0x0) 13:28:58 executing program 0: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/nvme-fabrics\x00', 0x0, 0x0) 13:28:58 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x4020940d, 0x0) 13:28:58 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0xffffffffffffffff, 0x0) 13:28:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x28}}, 0x0) 13:28:58 executing program 2: clock_gettime(0x0, &(0x7f0000000100)={0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x6}, &(0x7f00000000c0)={0x1}, &(0x7f0000000140)={r0}, 0x0) 13:28:58 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x0, 0x20}, &(0x7f0000000100)=0x18) 13:28:58 executing program 4: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION(r0, 0x79f, 0x0) 13:28:58 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f0000000d40)='TIPC\x00') 13:28:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000003400)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0) 13:28:58 executing program 5: socketpair(0x2, 0x0, 0x1ff, &(0x7f0000000000)) 13:28:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000003480)={'sit0\x00', 0x0}) 13:28:59 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1ec451d2"}, 0x0, 0x1, @planes=0x0}) 13:28:59 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0x40045612, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6abf3ae9"}, 0x0, 0x0, @planes=0x0}) 13:28:59 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) syz_init_net_socket$rose(0xb, 0x5, 0x0) 13:28:59 executing program 5: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x81000) 13:28:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x78) 13:28:59 executing program 4: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/136) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) 13:28:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003ec0)=[{{&(0x7f0000003000)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, &(0x7f0000003400)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0) 13:28:59 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) 13:28:59 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000000c0)={0x0, 0xc, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c1a8d65d"}}) 13:28:59 executing program 1: openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x484800, 0x0) 13:28:59 executing program 3: socketpair(0xa, 0x0, 0xffff0001, &(0x7f0000000000)) 13:28:59 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) 13:28:59 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 13:28:59 executing program 5: socketpair(0x11, 0x0, 0x0, &(0x7f0000000500)) 13:28:59 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000000)={0x3, {{0x2, 0x0, @private}}}, 0x88) 13:28:59 executing program 1: clock_gettime(0x2, &(0x7f00000009c0)) 13:28:59 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) socket$nl_generic(0x10, 0x3, 0x10) 13:28:59 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0205649, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6abf3ae9"}, 0x0, 0x0, @planes=0x0}) 13:28:59 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) 13:28:59 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) socket(0x2a, 0x0, 0x0) 13:28:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind(r0, 0x0, 0x0) 13:28:59 executing program 1: pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x8}, 0x0, &(0x7f00000001c0)={0x0, 0x3938700}, 0x0) 13:29:00 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000240)={0x0, 0xb, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cc139f17"}, 0x0, 0x0, @planes=0x0}) 13:29:00 executing program 4: bpf$MAP_CREATE(0x12, &(0x7f00000000c0), 0x40) 13:29:00 executing program 0: setreuid(0xee00, 0x0) openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) 13:29:00 executing program 2: pipe(&(0x7f0000001080)={0xffffffffffffffff, 0xffffffffffffffff}) read$usbmon(r0, 0x0, 0x0) 13:29:00 executing program 5: socket$inet(0xa, 0x1, 0x9) 13:29:00 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000180)={'security\x00', 0x4, "8f250bcb"}, &(0x7f0000000140)=0x28) 13:29:00 executing program 3: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000880)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0) 13:29:00 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000380)="21dd", 0x2, 0xfffffffe, &(0x7f0000001380)={0x2, 0x0, @loopback}, 0x10) 13:29:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005900)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:00 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x14440, 0x0) 13:29:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x3}}, 0x24}}, 0x0) 13:29:00 executing program 5: socket$inet(0xa, 0x1, 0x9) 13:29:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@deltfilter={0x24, 0x24, 0x1}, 0x24}}, 0x0) 13:29:00 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x40045565, 0x0) 13:29:00 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2, 0x1) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004280)={0x160, 0x0, 0x0, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {0x0, 0x0, 0xa, 0x0, '/dev/vcs#\x00'}}, {{}, {0x0, 0x0, 0xc, 0x0, '/dev/uinput\x00'}}]}, 0x160) 13:29:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x22, 0x0, &(0x7f0000000000)) 13:29:00 executing program 2: getitimer(0x3, &(0x7f0000000040)) 13:29:00 executing program 4: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)=""/128, 0x80}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2, &(0x7f0000002380)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1, 0x0) [ 375.689465][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 376.102420][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 376.117912][ T8939] usb usb4-port1: attempt power cycle [ 376.800771][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 377.136265][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 377.143856][ T8939] usb usb4-port1: unable to enumerate USB device 13:29:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001940)={'tunl0\x00', &(0x7f00000018c0)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 13:29:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x8, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:03 executing program 5: socket$inet(0xa, 0x1, 0x9) 13:29:03 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0xc, 0x0, &(0x7f0000000140)) 13:29:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005900)={0x18, 0x1, &(0x7f0000000000)=@raw=[@generic={0x1}], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@deltfilter={0x24, 0x16, 0x1}, 0x24}}, 0x0) 13:29:03 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f00000000c0), 0x0) 13:29:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", ""]}, 0x14}}, 0x0) 13:29:03 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x14, 0x0, 0x0) 13:29:03 executing program 1: clock_settime(0x0, &(0x7f00000004c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) 13:29:03 executing program 5: socket$inet(0xa, 0x1, 0x9) 13:29:03 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @multicast2}, {0x0, @link_local}, 0x0, {0x2, 0x0, @loopback}, 'macvlan1\x00'}) 13:29:03 executing program 1: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1f}) [ 378.718057][T12412] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 13:29:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22884, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2801, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:04 executing program 4: add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @auto=[0x37]}, &(0x7f0000000140)={0x0, "c8c4c18ba7c97c5ee96b8597df0c24f62647a63274ab3d2985c053b58edd567e65340884e6abb3b194a71b2a4663d4a8668182d771f4422e9dec34a94b5d2af3"}, 0x48, 0xfffffffffffffffb) 13:29:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(r0, &(0x7f0000008e40)={0x2020}, 0x2020) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="f4000000", @ANYRES16, @ANYBLOB="01"], 0xf4}}, 0x0) [ 378.797752][T12422] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 13:29:04 executing program 2: socket$inet(0x2, 0xf, 0x0) 13:29:04 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x10) 13:29:04 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) io_setup(0x6, &(0x7f0000000240)) 13:29:04 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{}, {0x1, @random="64c43728c444"}, 0x0, {0x2, 0x0, @empty}, 'veth0_to_hsr\x00'}) 13:29:04 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000040)=@raw=[@initr0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:04 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000140)='fuse\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, ' \x01\x00'}}]}}) 13:29:04 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x1000000, 0x29, 0x0, 0x0) 13:29:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x6, 0xfc, 0xb, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 13:29:04 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000021c0)='ns/ipc\x00') 13:29:04 executing program 1: io_cancel(0x0, &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 13:29:04 executing program 4: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x77359400}}, 0x0) [ 379.477376][T12448] fuse: Bad value for 'user_id' 13:29:04 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) bind$bt_sco(r0, 0x0, 0x0) 13:29:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[], 0xc8}, 0x3}, 0x0) 13:29:04 executing program 5: bpf$OBJ_GET_MAP(0x12, 0x0, 0x110) 13:29:04 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000380)="21dd", 0x2, 0x16, &(0x7f0000001380)={0x2, 0x0, @loopback}, 0x10) 13:29:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="d4000000280001"], 0xd4}}, 0x0) 13:29:05 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 13:29:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x40000}, 0x0) 13:29:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000380)="21dde6fc", 0x4, 0x0, &(0x7f0000001380)={0x2, 0x0, @loopback}, 0x10) 13:29:05 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x200000c, 0x10, r0, 0x8000000) [ 379.967778][T12467] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.4'. 13:29:05 executing program 4: r0 = socket$inet(0xa, 0x3, 0x8) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, 0x0, 0x0) 13:29:05 executing program 1: syz_emit_ethernet(0xffffff5d, &(0x7f0000000000)={@dev, @broadcast, @val={@void}, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @local, @ipv4, @broadcast, @private2}}}}, &(0x7f0000000080)) 13:29:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000004100)={0x0, 0x0, &(0x7f00000040c0)={0x0}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 13:29:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 13:29:05 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6abf3ae9"}, 0x0, 0x0, @planes=0x0}) 13:29:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:05 executing program 4: syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x0) 13:29:05 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:05 executing program 0: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:05 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:05 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee01) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:05 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:05 executing program 3: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:05 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:06 executing program 0: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:06 executing program 3: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556b, 0x0) 13:29:06 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000fc0)=""/152, &(0x7f0000001080)=0x98) 13:29:06 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:06 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:06 executing program 0: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x33fe0}}, 0x0) 13:29:06 executing program 3: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 13:29:06 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:06 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}}, 0x0) timerfd_gettime(r0, &(0x7f0000000280)) 13:29:06 executing program 1: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:07 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 13:29:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:07 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:29:07 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:29:07 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) socket(0x10, 0x2, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 13:29:07 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:29:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000035c0)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_NAN_FUNC={0x4}]}, 0x20}}, 0x0) 13:29:07 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:29:07 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:29:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[], 0x33fe0}}, 0x0) 13:29:07 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:07 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:29:07 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:29:07 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000000b00)=[{{&(0x7f00000000c0)=@nl=@proc, 0x80, &(0x7f0000000500)=[{&(0x7f0000000140)=""/138, 0x8a}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f0000000bc0)) 13:29:07 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:29:07 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0xb, 0x0, &(0x7f0000000140)) 13:29:07 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:29:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:07 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:08 executing program 2: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xea102fe0a1fa238, 0xffffffffffffffff, 0x0) 13:29:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:08 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xea) 13:29:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:08 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000000)=ANY=[], &(0x7f0000000140)=0x28) 13:29:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:08 executing program 5: r0 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='user\x00', &(0x7f0000000100)={'syz', 0x3}, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r0) 13:29:08 executing program 2: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000680)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x20, 0x1b96, 0x13, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x9b, 0xc0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x19, {0x9, 0x21, 0x6d, 0x0, 0x1, {0x22, 0x326}}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0x2, 0x65, 0x81}}}}}]}}]}}, &(0x7f0000000740)={0xa, &(0x7f00000006c0)={0xa, 0x6, 0x201, 0x1f, 0x7f, 0x87, 0x8, 0x7}, 0x24, &(0x7f0000000700)={0x5, 0xf, 0x24, 0x2, [@ss_container_id={0x14, 0x10, 0x4, 0x7, "4b89dd375ab504dbd6d77de47df56471"}, @wireless={0xb, 0x10, 0x1, 0x2, 0x88, 0x5, 0x2, 0x1000, 0x5b}]}}) pidfd_open(0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x503800) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') syz_io_uring_complete(0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d00)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) 13:29:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:08 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x53, 0x0, &(0x7f0000000300)) 13:29:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:09 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003940)=[{{&(0x7f0000000040)={0x2, 0x4e20, @private}, 0x10, 0x0}}], 0x1, 0x0) 13:29:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 384.142584][ T34] usb usb3-port1: Cannot enable. Maybe the USB cable is bad? [ 384.453180][ T34] usb usb3-port1: Cannot enable. Maybe the USB cable is bad? [ 384.460907][ T34] usb usb3-port1: attempt power cycle [ 385.102616][ T34] usb usb3-port1: Cannot enable. Maybe the USB cable is bad? [ 385.415639][ T34] usb usb3-port1: Cannot enable. Maybe the USB cable is bad? [ 385.423355][ T34] usb usb3-port1: unable to enumerate USB device 13:29:11 executing program 2: socketpair(0xa, 0x3, 0x7, &(0x7f0000000040)) 13:29:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:11 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:11 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x8) 13:29:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@deltfilter={0x24, 0x11, 0x1}, 0x24}}, 0x0) 13:29:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:12 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x1, &(0x7f0000000040)=@raw=[@call], &(0x7f00000000c0)='GPL\x00', 0x4, 0xff7, &(0x7f0000000100)=""/4087, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 387.101193][T12672] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 13:29:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:12 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000380)="21dd", 0x2, 0xf000000, &(0x7f0000001380)={0x2, 0x0, @loopback}, 0x10) 13:29:12 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x40045566, 0x0) 13:29:12 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:12 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x4, 0x0, 0x0) 13:29:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:12 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:'}, &(0x7f0000000140)={0x0, "f3ec17e5708a04f901c82b2a2e2e6368575f46df12d715feacaf1d1e76772c5c0cf2f43bd889e6c2331d86c9cda8ec9a53c11cc817c8cb600e1ee7d3c67274af"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 13:29:12 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:13 executing program 5: r0 = epoll_create(0x7) r1 = socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x40000014}) 13:29:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:13 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) 13:29:13 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:13 executing program 5: clock_gettime(0x6, &(0x7f0000001400)) 13:29:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:13 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:'}, &(0x7f0000000140)={0x0, "f3ec17e5708a04f901c82b2a2e2e6368575f46df12d715feacaf1d1e76772c5c0cf2f43bd889e6c2331d86c9cda8ec9a53c11cc817c8cb600e1ee7d3c67274af"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000940)={r0}, &(0x7f0000000980)={'enc=', 'oaep', ' hash=', {'tgr160\x00'}}, 0x0, 0x0) 13:29:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005900)={0x18, 0x6, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @generic={0x1, 0xd, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @generic, @ldst], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000080)=""/4096, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005880)={0x2, 0x2}, 0x8, 0x10, 0x0}, 0x78) 13:29:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:13 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x5502, 0x0) 13:29:13 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:13 executing program 5: syz_mount_image$fuse(&(0x7f0000000140)='fuse\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000080, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, ' \x01\x00'}}, {@audit='audit'}]}}) 13:29:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001380)={0x2, 0x0, @loopback}, 0x10) 13:29:14 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 388.978884][T12751] fuse: Bad value for 'fd' 13:29:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 389.013702][T12751] fuse: Bad value for 'fd' 13:29:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:14 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000140)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:29:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x50, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @private2}, @IFA_FLAGS={0xfe50}, @IFA_LOCAL={0x14, 0x2, @empty}, @IFA_FLAGS={0x8}]}, 0x50}}, 0x0) 13:29:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:14 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:14 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4b47, 0x0) 13:29:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 389.504875][T12771] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x7, 0x0, &(0x7f0000000140)) 13:29:14 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:14 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x30, 0x0, &(0x7f0000000140)) 13:29:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000001c0)=""/133, 0x85}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000280)=[{&(0x7f0000000000)=""/198, 0xc6}], 0x1) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r3, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r4, 0x0) 13:29:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:15 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000040)="443c071f", 0x4) 13:29:15 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e]}, 0x48) 13:29:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:15 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:16 executing program 2: syz_genetlink_get_family_id$netlbl_mgmt(0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 13:29:16 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x40045565, 0x0) 13:29:16 executing program 4: mkdir(0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:16 executing program 4: mkdir(0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:16 executing program 5: io_setup(0x6, &(0x7f0000000240)=0x0) io_submit(r0, 0x0, 0x0) io_pgetevents(r0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240), 0x8}) 13:29:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x4}, 0x0) 13:29:16 executing program 4: mkdir(0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:16 executing program 2: socketpair(0x10, 0x0, 0x7, &(0x7f0000000000)) 13:29:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x38, 0x0, &(0x7f0000000100)) 13:29:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:17 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:17 executing program 2: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x1d1000, 0x0) 13:29:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:17 executing program 5: io_setup(0x6, &(0x7f0000000240)=0x0) io_submit(r0, 0x0, 0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x3938700}, &(0x7f0000000280)={&(0x7f0000000240)={[0x2]}, 0x8}) 13:29:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:17 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:17 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0xfffffffd, 0x4) 13:29:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:17 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:17 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) 13:29:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:29:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:29:18 executing program 5: perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x61200, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40, 0x0, 0x0, 0x9, 0x0, 0xd945}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) 13:29:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 13:29:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:29:18 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x2041) 13:29:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000380)="21dd", 0x2, 0x0, &(0x7f0000001380)={0x2, 0x0, @loopback}, 0x20001390) 13:29:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:29:18 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:18 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x43, 0x0, &(0x7f0000000140)) 13:29:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:29:18 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x405c5503, 0x0) 13:29:19 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x6, 0xfc, 0xb, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x2, 0x4}, 0x40) write$tun(0xffffffffffffffff, 0x0, 0x0) 13:29:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:29:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:29:19 executing program 2: sched_setattr(0x0, &(0x7f0000004180)={0x38, 0x3}, 0x0) 13:29:19 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:19 executing program 5: getpid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_mount_image$fuse(&(0x7f0000000140)='fuse\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, ' \x01\x00'}}]}}) 13:29:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) [ 393.903510][T12952] fuse: Bad value for 'fd' 13:29:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@deltfilter={0x10, 0x2d, 0x1}, 0x24}}, 0x0) [ 393.934995][T12957] fuse: Bad value for 'fd' 13:29:19 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, r0}]}, &(0x7f0000001100)='syzkaller\x00', 0x1, 0xff7, &(0x7f0000000100)=""/4087, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:19 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x5, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x10000000) 13:29:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@deltfilter={0xec4, 0x2d, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @TCA_CHAIN={0x8}, @TCA_CHAIN={0x8}, @TCA_RATE={0x6}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0xe74, 0x2, [@TCA_ROUTE4_CLASSID={0x8}, @TCA_ROUTE4_FROM={0x8}, @TCA_ROUTE4_ACT={0xe60, 0x6, [@m_pedit={0xe5c, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe20}]}, {0xd, 0x6, "0e14b24b7753525fd9"}, {0xc}, {0xc}}}]}]}}]}, 0xec4}}, 0x4044050) 13:29:19 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 13:29:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@deltfilter={0x24, 0x2d, 0x1}, 0x24}, 0x300}, 0x0) 13:29:19 executing program 3: process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/188, 0xbc}], 0x1, &(0x7f0000000700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 13:29:19 executing program 0: request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff9) 13:29:19 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:19 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rpcgss_upcall_msg\x00'}, 0x10) 13:29:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x32, 0x0, &(0x7f0000000000)) 13:29:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x30, &(0x7f0000000180)={{{@in6, @in=@initdev}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xfffffffffffffed3) 13:29:19 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4, "85bff24d"}, &(0x7f0000000340)=0x28) 13:29:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0x7, 0x4, 0x3a0, 0x1d0, 0x1d0, 0x1d0, 0x2b8, 0x2b8, 0x2b8, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@arp={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vxcan1\x00', 'macvtap0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x3f0) 13:29:19 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13}, 0x40) 13:29:20 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d00)='/proc/self/net/pfkey\x00', 0x61040, 0x0) 13:29:20 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001380)={0x3, 0x0, @loopback}, 0x10) 13:29:20 executing program 1: socket$inet(0x10, 0x3, 0x1) 13:29:20 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000140)) 13:29:20 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:20 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000001e40)='/proc/self/net/pfkey\x00', 0x1c1800, 0x0) [ 395.144644][T13004] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! [ 395.191506][ T35] audit: type=1400 audit(1611149360.397:15): avc: denied { write } for pid=13001 comm="syz-executor.5" name="net" dev="proc" ino=42497 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 13:29:20 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, 0x4}) 13:29:20 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x1000000, 0x41, 0x0, 0x0) 13:29:20 executing program 5: bpf$OBJ_GET_MAP(0x12, 0x0, 0x0) 13:29:20 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) sendmsg(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) [ 395.368702][ T35] audit: type=1400 audit(1611149360.437:16): avc: denied { add_name } for pid=13001 comm="syz-executor.5" name="pfkey" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 13:29:20 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0x3, &(0x7f0000001140)=@framed, &(0x7f0000001100)='syzkaller\x00', 0x6, 0xff0, &(0x7f0000000100)=""/4080, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 395.480622][ T35] audit: type=1400 audit(1611149360.447:17): avc: denied { create } for pid=13001 comm="syz-executor.5" name="pfkey" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:kernel_t:s0 tclass=file permissive=1 13:29:20 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000bc0)) 13:29:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x31, 0x0, &(0x7f0000000000)) 13:29:20 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0xffffffffffffff2e) 13:29:21 executing program 2: socket$inet(0xf, 0x3, 0x0) 13:29:21 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:21 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000040)) 13:29:21 executing program 3: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0) 13:29:21 executing program 1: socket$inet(0xa, 0x2, 0x5) 13:29:21 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000002480)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000006c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 13:29:21 executing program 2: keyctl$update(0x14, 0x0, 0x0, 0x0) 13:29:21 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) 13:29:21 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x1) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) 13:29:21 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000380)="21ca", 0x2, 0x0, &(0x7f0000001380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3f}}, 0x10) 13:29:21 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000013c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x0, 0xe8, 0x0, 0xffffffff, 0xffffffff, 0x330, 0x330, 0x330, 0xffffffff, 0x4, 0x0, {[{{@ip={@broadcast, @local, 0x0, 0x0, 'bridge0\x00', 'ip_vti0\x00'}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ip={@dev, @empty, 0x0, 0x0, 'geneve0\x00', 'wg1\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:udev_exec_t:s0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x428) 13:29:21 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x40c0, 0x0) 13:29:21 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:21 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x2) 13:29:21 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0xff71, @any, 0x3}, 0xe) 13:29:22 executing program 5: keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000040), &(0x7f0000000080)=ANY=[@ANYBLOB='enc='], 0x0, 0x0) 13:29:22 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "d151b099d9098c353ed2726cfb47c9fd157354f545fb4d7ac602cb554d96ed6a719cfee1e67a50674dd2fa6d9e6de0992bfbde036f53507cc2a4859b17d262"}, 0x60) 13:29:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000004100)={0x0, 0x0, &(0x7f00000040c0)={0x0}}, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={0x0}}, 0x0) 13:29:22 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, 0x0, 0x0) 13:29:22 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 397.007965][T13086] x_tables: duplicate underflow at hook 2 13:29:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000180)={'security\x00', 0x4, "8f250bcb"}, &(0x7f0000000140)=0x2c) 13:29:22 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000003c0)={'filter\x00', 0x7, 0x4, 0x3b8, 0x100, 0x100, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x4, 0x0, {[{{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x408) 13:29:22 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x40045564, 0x0) 13:29:22 executing program 3: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x2b, 0x20, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x5}, {0x6, 0x24, 0x1a, 0xfff}}, {{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0xe}}, {{0x9, 0x5, 0x3, 0x2, 0x40}}}}}}}]}}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000300)=@string={0x4, 0x3, "aca4"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x280a}}]}) 13:29:22 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:22 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, 0x0, 0x0) 13:29:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 13:29:22 executing program 2: socket$inet(0xa, 0x2, 0x0) [ 397.281317][T13098] x_tables: duplicate underflow at hook 1 13:29:22 executing program 1: request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0) 13:29:22 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00'}) 13:29:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=@ipv6_newaddr={0x2c, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x3, 0x1, @private2}]}, 0x2c}}, 0x0) 13:29:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=@ipv6_newaddr={0x2c, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0xa, @private2}]}, 0x2c}}, 0x0) 13:29:22 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000680)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1b96, 0x13, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x9b, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0x2, 0x65}}}}}]}}]}}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0}) syz_genetlink_get_family_id$nbd(0x0) syz_io_uring_complete(0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) 13:29:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x12, 0x0, &(0x7f0000000100)) [ 397.652576][T13115] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 397.719959][T13118] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 397.728877][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 398.032190][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 398.039886][ T8939] usb usb4-port1: attempt power cycle [ 398.222250][ T34] usb usb2-port1: Cannot enable. Maybe the USB cable is bad? [ 398.532313][ T34] usb usb2-port1: Cannot enable. Maybe the USB cable is bad? [ 398.543651][ T34] usb usb2-port1: attempt power cycle [ 398.682533][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 398.994279][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 399.004328][ T8939] usb usb4-port1: unable to enumerate USB device [ 399.224852][ T34] usb usb2-port1: Cannot enable. Maybe the USB cable is bad? [ 399.543837][ T34] usb usb2-port1: Cannot enable. Maybe the USB cable is bad? [ 399.551551][ T34] usb usb2-port1: unable to enumerate USB device 13:29:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@deltfilter={0x24, 0x1d, 0x1}, 0x24}}, 0x0) 13:29:25 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:25 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000000)="21dd", 0x2, 0x8840, &(0x7f0000001380)={0x2, 0x0, @empty}, 0x10) 13:29:25 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x12, 0x0, 0x0) 13:29:25 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000003c0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x1f8, 0xe8, 0x1f8, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@broadcast, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'wlan1\x00', 'bridge_slave_0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @rand_addr, @private}}}, {{@arp={@local, @dev, 0x0, 0x0, 0x0, 0x0, {@mac=@multicast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_vlan\x00', 'wlan0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="0b4b950ff1e7", @empty, @dev}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) 13:29:25 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0xe, 0x0, 0x0) [ 400.301239][T13142] x_tables: duplicate underflow at hook 1 13:29:25 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x2e) 13:29:25 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007d00)={0x0, 0x0, &(0x7f0000007cc0)={&(0x7f0000007c00)=@deltaction={0x34, 0x31, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x20, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}]}]}, 0x34}}, 0x0) 13:29:25 executing program 3: syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x2) 13:29:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001280)={0x63b83350c1c5d062}, 0x40) 13:29:25 executing program 2: r0 = socket$inet(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 13:29:25 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000380)="21dd", 0xffeb, 0x0, &(0x7f0000001380)={0x2, 0x0, @loopback}, 0x10) 13:29:25 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x405c5503, 0x0) 13:29:25 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000140)='fuse\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}}) 13:29:25 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x2f, 0x0, &(0x7f0000000100)) [ 400.897831][T13168] fuse: Invalid rootmode 13:29:26 executing program 0: request_key(&(0x7f00000012c0)='user\x00', &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0) 13:29:26 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) 13:29:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 13:29:26 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0xffffffffffffffa1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:29:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=@ipv6_newaddr={0x2c, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x300, @private2}]}, 0x2c}}, 0x0) 13:29:26 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x17, 0x0, &(0x7f0000000140)) 13:29:26 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(0x0, 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:26 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000003840)={0x0, 0x0, 0x0}, 0x0) 13:29:26 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'netdevsim0\x00', {0x2, 0x0, @local}}) 13:29:26 executing program 3: getpid() ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000140)='fuse\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, ' \x01\x00'}}]}}) 13:29:26 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000180)={'HL\x00'}, &(0x7f0000001300)=0x1e) 13:29:26 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 13:29:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x406855c9, 0x0) [ 401.547231][T13205] fuse: Bad value for 'user_id' 13:29:26 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, 0x0) 13:29:26 executing program 3: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x77359400}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000001c0), 0x0) 13:29:26 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(0x0, 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:27 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'geneve1\x00'}) 13:29:27 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x4040, 0x0) 13:29:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003c80)=ANY=[@ANYBLOB="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"], 0x21b8}, 0x0) 13:29:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x1) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000040)) 13:29:27 executing program 3: r0 = socket(0x11, 0xa, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 13:29:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) 13:29:27 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(0x0, 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x1, 0x0, 0x6}, 0x40) 13:29:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) 13:29:27 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0) 13:29:27 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x0, 0xffffffff, 0xffffffff, 0x90, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@ip={@empty, @rand_addr, 0x0, 0x0, 'erspan0\x00', 'lo\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) 13:29:27 executing program 1: epoll_create(0x3) 13:29:27 executing program 0: r0 = getpid() process_vm_readv(r0, &(0x7f0000001580)=[{0x0}, {&(0x7f0000000300)=""/123, 0x7b}, {&(0x7f0000000380)=""/128, 0x80}], 0x3, &(0x7f00000017c0)=[{0x0}, {&(0x7f0000001700)=""/186, 0xba}], 0x2, 0x0) 13:29:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000040)=@generic={0x0, "e10a90670a9555e35d35dfbb3b7bd3fb17f829e8150ed830ba17617ec099bde2ec10136d1eb795331a925254ccc5ba1278a1df9406b11f9e0c938663b56239ff614b740d4eb910c72a0143e8ca042b5f88436da38edae3d27d13dd10d9e17fa654b2addeca4a088ce2fc68323be892d2a4f955cf28da8b9fbafc7391b80e"}, 0x80) [ 402.452530][T13247] x_tables: duplicate underflow at hook 3 13:29:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:27 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:27 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x6, 0x0, 0x0) 13:29:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x0, 0x0, 0xb}, 0x40) 13:29:28 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup3(r1, r0, 0x0) getpeername$inet(r2, 0x0, 0x0) 13:29:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private}}}}) 13:29:28 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000000)="9a02a99f75a05b3e", 0x8, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 13:29:28 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x40045568, 0x0) 13:29:28 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="d40000001200010027bd7000fddbdf25000000000c"], 0xd4}, 0x8}, 0x0) 13:29:28 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x17, 0x0, 0x0) 13:29:28 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000001200)='logon\x00', &(0x7f0000001240)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000003380)={0x0, "c2fb90e42b830918abb0b2333a518b4d9aed7b20a28fb0f831898446b381362657dae1b57ed33970c9c1a879575e79de7aafdf2423efc80d2a4ffed8c6548a9c"}, 0x48, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000003400)='=', 0x1) 13:29:28 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=ANY=[], 0xf}, 0x0) [ 403.265323][T13280] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.1'. 13:29:28 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 13:29:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=@ipv6_newaddr={0x2c, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x4, 0x1, @private2}]}, 0x2c}}, 0x0) 13:29:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0xa, 0x0, &(0x7f0000000100)) 13:29:28 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000001200)='logon\x00', &(0x7f0000001240)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000003380)={0x0, "c2fb90e42b830918abb0b2333a518b4d9aed7b20a28fb0f831898446b381362657dae1b57ed33970c9c1a879575e79de7aafdf2423efc80d2a4ffed8c6548a9c"}, 0x48, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000003400)='=', 0x1) 13:29:28 executing program 3: keyctl$update(0x18, 0x0, &(0x7f0000003400), 0x0) 13:29:29 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x42, 0x0, &(0x7f0000000140)) 13:29:29 executing program 5: syz_mount_image$fuse(&(0x7f0000000240)='fuse\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@measure='measure'}]}}) 13:29:29 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001380)={0xd, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 13:29:29 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 13:29:29 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000001200)='logon\x00', &(0x7f0000001240)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000003380)={0x0, "c2fb90e42b830918abb0b2333a518b4d9aed7b20a28fb0f831898446b381362657dae1b57ed33970c9c1a879575e79de7aafdf2423efc80d2a4ffed8c6548a9c"}, 0x48, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000003400)='=', 0x1) 13:29:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) [ 404.144660][T13305] fuse: Bad value for 'fd' [ 404.191738][T13305] fuse: Bad value for 'fd' 13:29:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="88000000665145"], 0x88}}, 0x0) 13:29:29 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000001280)) 13:29:29 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000001200)='logon\x00', &(0x7f0000001240)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000003380)={0x0, "c2fb90e42b830918abb0b2333a518b4d9aed7b20a28fb0f831898446b381362657dae1b57ed33970c9c1a879575e79de7aafdf2423efc80d2a4ffed8c6548a9c"}, 0x48, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000003400)='=', 0x1) 13:29:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000012c0)='user\x00', &(0x7f0000001300)={'syz', 0x2}, &(0x7f0000001340)='\\-{.,\x00', r0) 13:29:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005900)={0x18, 0x5, &(0x7f0000000000)=@raw=[@func, @btf_id, @generic, @ldst], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000080)=""/4096, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005880)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000058c0)={0x5, 0xe, 0x6, 0xed26}, 0x10}, 0x78) 13:29:29 executing program 0: r0 = getpid() capget(&(0x7f0000000040)={0x19980330, r0}, &(0x7f0000000080)) 13:29:29 executing program 5: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$tcp_mem(r0, &(0x7f0000000340), 0x48) 13:29:30 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:30 executing program 2: bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) 13:29:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x0, &(0x7f00000024c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) 13:29:30 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) [ 404.951600][T13332] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 13:29:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x17, 0x0, &(0x7f0000000000)) 13:29:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@deltfilter={0x24, 0x2c, 0x1}, 0x24}}, 0x0) 13:29:30 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x15, 0x0, &(0x7f0000000140)) 13:29:30 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'bond0\x00'}) 13:29:30 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 13:29:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x3, 0x0, &(0x7f0000000000)) 13:29:30 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/self/net/pfkey\x00', 0xc00, 0x0) 13:29:30 executing program 0: bpf$OBJ_GET_MAP(0xa, 0x0, 0x0) 13:29:30 executing program 5: getpid() syz_mount_image$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000080, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, '.)&\x88-'}}]}}) [ 405.586487][T13351] bond0: mtu less than device minimum 13:29:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x5501, 0x0) 13:29:30 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @auto=[0x32, 0x64]}, &(0x7f0000000140)={0x0, "f3ec17e5708a04f901c82b2a2e2e6368575f46df12d715feacaf1d1e76772c5c0cf2f43bd889e6c2331d86c9cda8ec9a53c11cc817c8cb600e1ee7d3c67274af"}, 0x48, 0xfffffffffffffffe) keyctl$update(0xf, r0, 0x0, 0x18) 13:29:31 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 13:29:31 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556d, 0x0) 13:29:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7ffffff2}, 0x0) 13:29:31 executing program 5: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:29:31 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4d6401, 0x0) 13:29:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x5501, 0x0) 13:29:31 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 13:29:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:31 executing program 0: getresgid(&(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)) 13:29:31 executing program 5: syz_genetlink_get_family_id$batadv(&(0x7f0000004040)='batadv\x00') getresgid(&(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)) 13:29:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@deltfilter={0x24, 0x2d, 0x1}, 0x24}}, 0x0) 13:29:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x5501, 0x0) 13:29:31 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556e, 0x0) 13:29:31 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 13:29:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$nfc_raw(r0, &(0x7f0000000040), 0x10) 13:29:32 executing program 0: syz_genetlink_get_family_id$batadv(0xffffffffffffffff) 13:29:32 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000), 0xe) 13:29:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x5501, 0x0) 13:29:32 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000180), 0x4) 13:29:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0xffffffffffffffff, 0x0) 13:29:32 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 13:29:32 executing program 5: socketpair(0xa, 0x3, 0x7, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000f80)={'ip6tnl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x80, 0x5f, 0x63, 0x6d, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @remote, 0x10, 0x8, 0x28, 0x400}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl1\x00', r2, 0x29, 0x40, 0x3f, 0x8001, 0x34, @private0={0xfc, 0x0, [], 0x1}, @loopback, 0x40, 0x7e0, 0x20, 0x6}}) 13:29:32 executing program 0: socket(0x10, 0x3, 0x2) 13:29:32 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 13:29:32 executing program 2: sched_getaffinity(0x0, 0x8, &(0x7f0000000480)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 13:29:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipmr_delroute={0x1c, 0x19, 0x209}, 0x1c}}, 0x0) 13:29:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005900)={0x18, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:33 executing program 0: timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000140)) 13:29:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000000c0)={'syztnl1\x00', 0x0}) 13:29:33 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) 13:29:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 13:29:33 executing program 2: keyctl$update(0x1a, 0x0, 0x0, 0x0) 13:29:33 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x8, 0x0, &(0x7f0000000140)) 13:29:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@private, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@remote}}}, 0xe8) 13:29:33 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x10000000) 13:29:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000a80)=@framed, &(0x7f0000000b00)='syzkaller\x00', 0x0, 0x2a, &(0x7f0000000b40)=""/42, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000140)='syz0\x00') 13:29:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x5, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, 0x0, &(0x7f0000000100)) 13:29:33 executing program 0: perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:33 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x28}, 0xc) 13:29:34 executing program 1: timerfd_create(0x0, 0x0) clock_gettime(0x6, &(0x7f0000000100)) 13:29:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @local, @local, {[@rr={0x7, 0x3}]}}}}}) 13:29:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x82) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 13:29:34 executing program 0: socketpair(0x11, 0x2, 0x7, &(0x7f0000000000)) 13:29:34 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) write$tun(r0, &(0x7f0000000080)={@void, @val, @ipv6=@gre_packet={0x0, 0x6, "b3d59e", 0x44, 0x2f, 0x0, @private2, @private0}}, 0x76) 13:29:34 executing program 1: socket(0x7c9fa8ff3342d1b2, 0x0, 0x0) 13:29:34 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x4000, 0x0) 13:29:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x27, 0x0, &(0x7f0000000100)) 13:29:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) 13:29:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001a80)={'batadv_slave_0\x00'}) 13:29:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x9, 0x0, &(0x7f0000000100)) 13:29:34 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x38}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)) 13:29:34 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @rand_addr=0x64010100, @multicast2}, 0xc) 13:29:34 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x82c0, 0x0) 13:29:34 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x1100) 13:29:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x311}, 0x14}}, 0x0) 13:29:34 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x0, r0/1000+10000}) 13:29:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000004e40)=[{{0x0, 0x0, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 13:29:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x14, 0x0, &(0x7f0000000140)) 13:29:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:35 executing program 3: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 13:29:35 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:35 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:35 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) socket(0x10, 0x2, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:35 executing program 4 (fault-call:5 fault-nth:0): mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:35 executing program 1 (fault-call:0 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 410.424032][T13529] FAULT_INJECTION: forcing a failure. [ 410.424032][T13529] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 410.457632][T13528] FAULT_INJECTION: forcing a failure. [ 410.457632][T13528] name failslab, interval 1, probability 0, space 0, times 1 [ 410.512539][T13529] CPU: 0 PID: 13529 Comm: syz-executor.1 Not tainted 5.11.0-rc4-syzkaller #0 [ 410.521392][T13529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.531591][T13529] Call Trace: [ 410.534918][T13529] dump_stack+0x107/0x163 [ 410.539422][T13529] should_fail.cold+0x5/0xa [ 410.544032][T13529] _copy_from_user+0x2c/0x180 [ 410.548910][T13529] __do_sys_bpf+0x156/0x4f10 [ 410.553780][T13529] ? bpf_link_get_from_fd+0x110/0x110 [ 410.559496][T13529] ? __mutex_unlock_slowpath+0xe2/0x610 [ 410.565186][T13529] ? wait_for_completion_io+0x260/0x260 [ 410.570824][T13529] ? syscall_enter_from_user_mode+0x1d/0x50 [ 410.576793][T13529] do_syscall_64+0x2d/0x70 [ 410.581286][T13529] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 410.587251][T13529] RIP: 0033:0x45e219 [ 410.591218][T13529] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 410.614639][T13529] RSP: 002b:00007fa113327c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 410.623140][T13529] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 410.631206][T13529] RDX: 0000000000000048 RSI: 000000002000e000 RDI: 0000000000000005 [ 410.639218][T13529] RBP: 00007fa113327ca0 R08: 0000000000000000 R09: 0000000000000000 [ 410.647236][T13529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 410.655292][T13529] R13: 00007ffe1c12a09f R14: 00007fa1133289c0 R15: 000000000119bf8c [ 410.663415][T13528] CPU: 1 PID: 13528 Comm: syz-executor.4 Not tainted 5.11.0-rc4-syzkaller #0 [ 410.672289][T13528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.682431][T13528] Call Trace: [ 410.685792][T13528] dump_stack+0x107/0x163 [ 410.690269][T13528] should_fail.cold+0x5/0xa [ 410.694861][T13528] should_failslab+0x5/0x10 [ 410.699493][T13528] kmem_cache_alloc+0x54/0x4c0 [ 410.704405][T13528] getname_flags.part.0+0x50/0x4f0 [ 410.709684][T13528] getname+0x8e/0xd0 13:29:35 executing program 2 (fault-call:0 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:35 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:35 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 410.713673][T13528] do_sys_openat2+0xf5/0x420 [ 410.718470][T13528] ? build_open_flags+0x680/0x680 [ 410.723593][T13528] ? wait_for_completion_io+0x260/0x260 [ 410.729194][T13528] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 410.735577][T13528] __x64_sys_open+0x119/0x1c0 [ 410.740303][T13528] ? do_sys_open+0x140/0x140 [ 410.744954][T13528] ? syscall_enter_from_user_mode+0x1d/0x50 [ 410.750956][T13528] do_syscall_64+0x2d/0x70 [ 410.755596][T13528] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 410.761582][T13528] RIP: 0033:0x45e219 [ 410.765585][T13528] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 410.785254][T13528] RSP: 002b:00007f3d1659ec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 410.793708][T13528] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 410.801712][T13528] RDX: 5f37900f6c944c2a RSI: c40beb2474df942a RDI: 00000000200002c0 [ 410.809769][T13528] RBP: 00007f3d1659eca0 R08: 0000000000000000 R09: 0000000000000000 [ 410.817991][T13528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 410.826006][T13528] R13: 00007ffdb48402bf R14: 00007f3d1659f9c0 R15: 000000000119bf8c [ 410.852342][ T2990] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 411.009186][T13536] FAULT_INJECTION: forcing a failure. [ 411.009186][T13536] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 411.067591][T13536] CPU: 1 PID: 13536 Comm: syz-executor.2 Not tainted 5.11.0-rc4-syzkaller #0 [ 411.076629][T13536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.087062][T13536] Call Trace: [ 411.090631][T13536] dump_stack+0x107/0x163 [ 411.095185][T13536] should_fail.cold+0x5/0xa [ 411.099919][T13536] _copy_from_user+0x2c/0x180 [ 411.104801][T13536] __do_sys_bpf+0x156/0x4f10 [ 411.109619][T13536] ? bpf_link_get_from_fd+0x110/0x110 [ 411.115316][T13536] ? __mutex_unlock_slowpath+0xe2/0x610 [ 411.121100][T13536] ? wait_for_completion_io+0x260/0x260 [ 411.126850][T13536] ? syscall_enter_from_user_mode+0x1d/0x50 [ 411.132968][T13536] do_syscall_64+0x2d/0x70 [ 411.137665][T13536] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 411.143752][T13536] RIP: 0033:0x45e219 [ 411.147811][T13536] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 411.167779][T13536] RSP: 002b:00007f6dbc7b0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 411.176381][T13536] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 411.184529][T13536] RDX: 0000000000000048 RSI: 000000002000e000 RDI: 0000000000000005 [ 411.192717][T13536] RBP: 00007f6dbc7b0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 411.200983][T13536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 411.209079][T13536] R13: 00007ffc9f9e4c6f R14: 00007f6dbc7b19c0 R15: 000000000119bf8c [ 411.228088][ T2990] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 411.243123][ T2990] usb usb4-port1: attempt power cycle 13:29:36 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:36 executing program 1 (fault-call:0 fault-nth:1): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:36 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 411.416350][T13541] FAULT_INJECTION: forcing a failure. [ 411.416350][T13541] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 411.465777][T13541] CPU: 1 PID: 13541 Comm: syz-executor.1 Not tainted 5.11.0-rc4-syzkaller #0 [ 411.474635][T13541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.484763][T13541] Call Trace: [ 411.488081][T13541] dump_stack+0x107/0x163 [ 411.492472][T13541] should_fail.cold+0x5/0xa [ 411.497113][T13541] strncpy_from_user+0x34/0x3e0 [ 411.502134][T13541] bpf_prog_load+0x14a/0x1f40 [ 411.506915][T13541] ? __bpf_prog_put.constprop.0+0x1a0/0x1a0 [ 411.512902][T13541] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 411.519220][T13541] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 411.525546][T13541] ? avc_has_perm+0x107/0x1b0 [ 411.530380][T13541] ? avc_has_perm_noaudit+0x390/0x390 [ 411.535807][T13541] ? lock_downgrade+0x6d0/0x6d0 [ 411.541081][T13541] ? selinux_bpf+0xe7/0x120 [ 411.545717][T13541] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 411.552060][T13541] __do_sys_bpf+0x1251/0x4f10 [ 411.556804][T13541] ? bpf_link_get_from_fd+0x110/0x110 [ 411.562320][T13541] ? __mutex_unlock_slowpath+0xe2/0x610 [ 411.567956][T13541] ? wait_for_completion_io+0x260/0x260 [ 411.573598][T13541] ? syscall_enter_from_user_mode+0x1d/0x50 [ 411.579572][T13541] do_syscall_64+0x2d/0x70 [ 411.584058][T13541] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 411.590015][T13541] RIP: 0033:0x45e219 [ 411.593969][T13541] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 411.613734][T13541] RSP: 002b:00007fa113327c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 411.622204][T13541] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 411.630237][T13541] RDX: 0000000000000048 RSI: 000000002000e000 RDI: 0000000000000005 [ 411.638394][T13541] RBP: 00007fa113327ca0 R08: 0000000000000000 R09: 0000000000000000 [ 411.646406][T13541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 411.654449][T13541] R13: 00007ffe1c12a09f R14: 00007fa1133289c0 R15: 000000000119bf8c [ 411.683373][ T7] Bluetooth: hci0: command 0x0406 tx timeout [ 411.686246][ T9869] Bluetooth: hci2: command 0x0406 tx timeout [ 411.694760][ T7] Bluetooth: hci3: command 0x0406 tx timeout [ 411.700278][ T9869] Bluetooth: hci1: command 0x0406 tx timeout [ 411.715743][ T7] Bluetooth: hci4: command 0x0406 tx timeout [ 411.734609][ T7] Bluetooth: hci5: command 0x0406 tx timeout [ 412.134945][ T2990] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 412.466619][ T2990] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 412.475499][ T2990] usb usb4-port1: unable to enumerate USB device 13:29:38 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) 13:29:38 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:38 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:38 executing program 2 (fault-call:0 fault-nth:1): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:38 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:38 executing program 1 (fault-call:0 fault-nth:2): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 413.183407][T13557] FAULT_INJECTION: forcing a failure. [ 413.183407][T13557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 413.236747][T13561] FAULT_INJECTION: forcing a failure. [ 413.236747][T13561] name failslab, interval 1, probability 0, space 0, times 0 [ 413.276119][T13557] CPU: 1 PID: 13557 Comm: syz-executor.2 Not tainted 5.11.0-rc4-syzkaller #0 [ 413.284972][T13557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.295188][T13557] Call Trace: [ 413.298544][T13557] dump_stack+0x107/0x163 [ 413.303588][T13557] should_fail.cold+0x5/0xa [ 413.305988][T13563] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 413.308147][T13557] strncpy_from_user+0x34/0x3e0 [ 413.308201][T13557] bpf_prog_load+0x14a/0x1f40 [ 413.308247][T13557] ? __bpf_prog_put.constprop.0+0x1a0/0x1a0 [ 413.330884][T13557] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 413.337200][T13557] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 413.343766][T13557] ? avc_has_perm+0x107/0x1b0 [ 413.348499][T13557] ? avc_has_perm_noaudit+0x390/0x390 [ 413.353927][T13557] ? lock_downgrade+0x6d0/0x6d0 [ 413.358875][T13557] ? selinux_bpf+0xe7/0x120 [ 413.363463][T13557] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 413.369768][T13557] __do_sys_bpf+0x1251/0x4f10 [ 413.374868][T13557] ? bpf_link_get_from_fd+0x110/0x110 [ 413.380319][T13557] ? __mutex_unlock_slowpath+0xe2/0x610 [ 413.389155][T13557] ? wait_for_completion_io+0x260/0x260 [ 413.394892][T13557] ? syscall_enter_from_user_mode+0x1d/0x50 [ 413.400855][T13557] do_syscall_64+0x2d/0x70 [ 413.405373][T13557] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 413.411349][T13557] RIP: 0033:0x45e219 [ 413.415304][T13557] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:29:38 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:38 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 413.434971][T13557] RSP: 002b:00007f6dbc7b0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 413.443521][T13557] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 413.451537][T13557] RDX: 0000000000000048 RSI: 000000002000e000 RDI: 0000000000000005 [ 413.459579][T13557] RBP: 00007f6dbc7b0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 413.467773][T13557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.475794][T13557] R13: 00007ffc9f9e4c6f R14: 00007f6dbc7b19c0 R15: 000000000119bf8c [ 413.507454][T13561] CPU: 0 PID: 13561 Comm: syz-executor.1 Not tainted 5.11.0-rc4-syzkaller #0 [ 413.516401][T13561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.526520][T13561] Call Trace: [ 413.529838][T13561] dump_stack+0x107/0x163 [ 413.534235][T13561] should_fail.cold+0x5/0xa [ 413.538830][T13561] should_failslab+0x5/0x10 [ 413.543490][T13561] kmem_cache_alloc_node_trace+0x69/0x520 [ 413.549433][T13561] ? cred_has_capability.isra.0+0x14e/0x2b0 [ 413.555404][T13561] __get_vm_area_node+0xd3/0x380 [ 413.560523][T13561] ? bpf_prog_alloc_no_stats+0x33/0x2e0 [ 413.566129][T13561] __vmalloc+0xf3/0x1a0 [ 413.570335][T13561] ? bpf_prog_alloc_no_stats+0x33/0x2e0 [ 413.575948][T13561] bpf_prog_alloc_no_stats+0x33/0x2e0 [ 413.581403][T13561] bpf_prog_alloc+0x2c/0x250 [ 413.586069][T13561] bpf_prog_load+0x656/0x1f40 [ 413.590790][T13561] ? __bpf_prog_put.constprop.0+0x1a0/0x1a0 [ 413.596758][T13561] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 413.603059][T13561] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 413.609400][T13561] ? avc_has_perm+0x107/0x1b0 [ 413.614275][T13561] ? avc_has_perm_noaudit+0x390/0x390 [ 413.619866][T13561] ? selinux_bpf+0xe7/0x120 [ 413.624627][T13561] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 413.630999][T13561] __do_sys_bpf+0x1251/0x4f10 [ 413.635773][T13561] ? bpf_link_get_from_fd+0x110/0x110 [ 413.641221][T13561] ? __mutex_unlock_slowpath+0xe2/0x610 [ 413.646864][T13561] ? wait_for_completion_io+0x260/0x260 [ 413.652493][T13561] ? syscall_enter_from_user_mode+0x1d/0x50 [ 413.658430][T13561] do_syscall_64+0x2d/0x70 [ 413.662876][T13561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 413.668910][T13561] RIP: 0033:0x45e219 [ 413.672825][T13561] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.692578][T13561] RSP: 002b:00007fa113327c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:29:38 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x1a01) [ 413.701026][T13561] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 413.709029][T13561] RDX: 0000000000000048 RSI: 000000002000e000 RDI: 0000000000000005 [ 413.717035][T13561] RBP: 00007fa113327ca0 R08: 0000000000000000 R09: 0000000000000000 [ 413.725054][T13561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 413.733057][T13561] R13: 00007ffe1c12a09f R14: 00007fa1133289c0 R15: 000000000119bf8c 13:29:39 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df9444, 0x5f37900f6c944c2a) 13:29:39 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:39 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x10, 0x0, 0x0) 13:29:39 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c44) 13:29:39 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x10, 0x29, 0x0, 0x0) 13:29:39 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 414.538123][T13561] syz-executor.1: vmalloc: allocation failure: 4096 bytes, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 414.599635][T13561] CPU: 0 PID: 13561 Comm: syz-executor.1 Not tainted 5.11.0-rc4-syzkaller #0 [ 414.609085][T13561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.619986][T13561] Call Trace: [ 414.623478][T13561] dump_stack+0x107/0x163 [ 414.628150][T13561] warn_alloc.cold+0x87/0x17a [ 414.633322][T13561] ? zone_watermark_ok_safe+0x2a0/0x2a0 [ 414.639421][T13561] ? kmem_cache_alloc_node_trace+0x40b/0x520 [ 414.646630][T13561] ? cred_has_capability.isra.0+0x14e/0x2b0 [ 414.653152][T13561] ? __get_vm_area_node+0x292/0x380 [ 414.659089][T13561] ? bpf_prog_alloc_no_stats+0x33/0x2e0 [ 414.665816][T13561] __vmalloc+0x15e/0x1a0 [ 414.670446][T13561] bpf_prog_alloc_no_stats+0x33/0x2e0 [ 414.676037][T13561] bpf_prog_alloc+0x2c/0x250 [ 414.680975][T13561] bpf_prog_load+0x656/0x1f40 [ 414.685962][T13561] ? __bpf_prog_put.constprop.0+0x1a0/0x1a0 [ 414.692055][T13561] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 414.700953][T13561] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 414.707441][T13561] ? avc_has_perm+0x107/0x1b0 [ 414.712259][T13561] ? avc_has_perm_noaudit+0x390/0x390 [ 414.717772][T13561] ? selinux_bpf+0xe7/0x120 [ 414.722518][T13561] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 414.728939][T13561] __do_sys_bpf+0x1251/0x4f10 [ 414.734632][T13561] ? bpf_link_get_from_fd+0x110/0x110 [ 414.742270][T13561] ? __mutex_unlock_slowpath+0xe2/0x610 [ 414.748132][T13561] ? wait_for_completion_io+0x260/0x260 [ 414.754667][T13561] ? syscall_enter_from_user_mode+0x1d/0x50 [ 414.760885][T13561] do_syscall_64+0x2d/0x70 [ 414.765626][T13561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 414.771867][T13561] RIP: 0033:0x45e219 [ 414.775960][T13561] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.796346][T13561] RSP: 002b:00007fa113327c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 414.804926][T13561] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 414.813032][T13561] RDX: 0000000000000048 RSI: 000000002000e000 RDI: 0000000000000005 [ 414.822284][T13561] RBP: 00007fa113327ca0 R08: 0000000000000000 R09: 0000000000000000 [ 414.830425][T13561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 414.839066][T13561] R13: 00007ffe1c12a09f R14: 00007fa1133289c0 R15: 000000000119bf8c [ 414.960005][T13561] Mem-Info: [ 414.968729][T13561] active_anon:278 inactive_anon:171181 isolated_anon:0 [ 414.968729][T13561] active_file:5667 inactive_file:42613 isolated_file:0 [ 414.968729][T13561] unevictable:768 dirty:200 writeback:0 [ 414.968729][T13561] slab_reclaimable:22930 slab_unreclaimable:112806 [ 414.968729][T13561] mapped:61159 shmem:5824 pagetables:1300 bounce:0 [ 414.968729][T13561] free:1252488 free_pcp:621 free_cma:0 [ 415.069960][T13561] Node 0 active_anon:1112kB inactive_anon:684724kB active_file:22524kB inactive_file:170452kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:244636kB dirty:796kB writeback:0kB shmem:21760kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 505856kB writeback_tmp:0kB kernel_stack:8704kB pagetables:5192kB all_unreclaimable? no [ 415.115578][T13561] Node 1 active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:1536kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:0kB pagetables:8kB all_unreclaimable? no [ 415.183074][T13561] Node 0 DMA free:15908kB min:208kB low:260kB high:312kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 415.221664][T13561] lowmem_reserve[]: 0 2659 2659 2659 2659 [ 415.228702][T13561] Node 0 DMA32 free:978696kB min:35732kB low:44664kB high:53596kB reserved_highatomic:0KB active_anon:1108kB inactive_anon:684804kB active_file:22528kB inactive_file:170460kB unevictable:1536kB writepending:888kB present:3129332kB managed:2728304kB mlocked:0kB bounce:0kB free_pcp:2684kB local_pcp:1352kB free_cma:0kB [ 415.261875][T13561] lowmem_reserve[]: 0 0 0 0 0 [ 415.267107][T13561] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:0kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 415.312412][T13561] lowmem_reserve[]: 0 0 0 0 0 [ 415.317251][T13561] Node 1 Normal free:4014668kB min:54168kB low:67708kB high:81248kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4128264kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 415.356946][T13561] lowmem_reserve[]: 0 0 0 0 0 [ 415.361759][T13561] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 415.399059][T13561] Node 0 DMA32: 10618*4kB (UME) 1854*8kB (UME) 1269*16kB (UME) 697*32kB (UME) 307*64kB (UM) 158*128kB (UME) 38*256kB (UM) 11*512kB (UME) 2*1024kB (ME) 6*2048kB (UME) 197*4096kB (M) = 976392kB [ 415.430345][T13561] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 415.452379][T13561] Node 1 Normal: 135*4kB (UME) 236*8kB (UME) 203*16kB (UME) 93*32kB (UME) 46*64kB (UME) 24*128kB (UME) 13*256kB (UM) 4*512kB (UE) 3*1024kB (UME) 1*2048kB (M) 974*4096kB (M) = 4014668kB [ 415.471683][T13561] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 415.490563][T13561] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 415.511580][T13561] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 415.535552][T13561] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 415.555960][T13561] 53838 total pagecache pages [ 415.560750][T13561] 0 pages in swap cache [ 415.583342][T13561] Swap cache stats: add 0, delete 0, find 0/0 [ 415.589537][T13561] Free swap = 0kB [ 415.616764][T13561] Total swap = 0kB [ 415.620654][T13561] 2097051 pages RAM [ 415.627221][T13561] 0 pages HighMem/MovableOnly 13:29:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:40 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) socket(0x10, 0x2, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:40 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f0000000040)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[], 0x150}, 0x0) 13:29:40 executing program 2: bpf$PROG_LOAD(0x2, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:40 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 415.631924][T13561] 378932 pages reserved [ 415.638896][T13561] 0 pages cma reserved 13:29:41 executing program 5: chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:41 executing program 2: bpf$PROG_LOAD(0x3, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:41 executing program 3: setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, 0x0) 13:29:41 executing program 1: bpf$PROG_LOAD(0x2, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:41 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:41 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080)='bpf\x00', 0x800040, &(0x7f0000000180)={[{@mode={'mode', 0x3d, 0xffffffffffff1218}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0xffffffff00000000}}, {@mode={'mode', 0x3d, 0xfffffffffffffffa}}, {@mode={'mode', 0x3d, 0x9c}}], [{@fsname={'fsname', 0x3d, '-!#\xbf\\%\'@):'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@subj_user={'subj_user'}}, {@fsname={'fsname'}}, {@obj_role={'obj_role', 0x3d, '%&'}}]}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:41 executing program 5: chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:41 executing program 1: bpf$PROG_LOAD(0x3, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:41 executing program 2: bpf$PROG_LOAD(0x4, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:41 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0xf, 0x0, &(0x7f0000000140)) 13:29:41 executing program 0: chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 416.274338][T13627] bpf: Bad value for 'mode' 13:29:41 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) recvmmsg(0xffffffffffffffff, &(0x7f00000044c0)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/66, 0x42}, {&(0x7f0000000180)=""/155, 0x9b}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000000300)=""/148, 0x94}, {&(0x7f00000000c0)=""/65, 0x41}, {&(0x7f00000003c0)=""/144, 0x90}], 0x6}, 0x8}, {{&(0x7f0000000480)=@tipc, 0x80, &(0x7f0000000780)=[{&(0x7f0000000500)=""/97, 0x61}, {&(0x7f0000000580)=""/77, 0x4d}, {&(0x7f0000000600)=""/101, 0x65}, {&(0x7f0000000680)=""/60, 0x3c}, {&(0x7f00000006c0)}, {&(0x7f0000000700)=""/124, 0x7c}], 0x6, &(0x7f0000000800)=""/63, 0x3f}, 0x7}, {{0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000000840)=""/150, 0x96}, {&(0x7f0000001980)=""/153, 0x99}, {&(0x7f0000001a40)=""/148, 0x94}, {&(0x7f0000001b00)=""/153, 0x99}, {&(0x7f0000001bc0)=""/176, 0xb0}, {&(0x7f0000001c80)=""/4096, 0x1000}], 0x6}, 0x4}, {{&(0x7f0000002d00)=@caif=@rfm, 0x80, &(0x7f0000000900)}, 0x2}, {{&(0x7f0000002d80)=@nl=@unspec, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002e00)=""/35, 0x23}, {&(0x7f0000002e40)=""/231, 0xe7}], 0x2}, 0x8}, {{0x0, 0x0, &(0x7f0000004200)=[{&(0x7f0000002f80)=""/95, 0x5f}, {&(0x7f0000003000)=""/221, 0xdd}, {&(0x7f0000003100)=""/4096, 0x1000}, {&(0x7f0000004100)=""/203, 0xcb}], 0x4}}, {{&(0x7f0000004240)=@phonet, 0x80, &(0x7f0000004440)=[{&(0x7f00000042c0)=""/80, 0x50}, {&(0x7f0000004340)=""/196, 0xc4}], 0x2, &(0x7f0000004480)=""/26, 0x1a}, 0xd6d0}], 0x7, 0x10000, &(0x7f0000004680)={0x0, 0x989680}) stat(&(0x7f00000006c0)='./control\x00', &(0x7f00000046c0)) lsetxattr$security_capability(&(0x7f0000000900)='./control\x00', &(0x7f0000004740)='security.capability\x00', &(0x7f0000004780)=@v2={0x2000000, [{0xc00, 0xb9d}, {0x1ff, 0x57}]}, 0x14, 0x2) 13:29:41 executing program 5: chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000003fc0)={0x0, 0x0, &(0x7f0000003f80)={0x0}}, 0x40001) 13:29:41 executing program 1: bpf$PROG_LOAD(0x4, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:41 executing program 2: bpf$PROG_LOAD(0x6, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:41 executing program 0: chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:42 executing program 5: mkdir(0x0, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:42 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:'}, &(0x7f0000000140)={0x0, "f3ec17e5708a04f901c82b2a2e2e6368575f46df12d715feacaf1d1e76772c5c0cf2f43bd889e6c2331d86c9cda8ec9a53c11cc817c8cb600e1ee7d3c67274af"}, 0x48, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:'}, &(0x7f0000000140)={0x0, "f3ec17e5708a04f901c82b2a2e2e6368575f46df12d715feacaf1d1e76772c5c0cf2f43bd889e6c2331d86c9cda8ec9a53c11cc817c8cb600e1ee7d3c67274af"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) add_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, r0) 13:29:42 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000380)={'nat\x00'}, &(0x7f0000000100)=0x78) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./control\x00', 0x100000000, 0x3, &(0x7f0000000240)=[{&(0x7f0000000180)="3dd9fc5b440922a21a737bf8fd2c1effddc70c164e82812324595f750331eafb1f87b7c7390358228b6e8aab2ee25b0ef51c0c3710488c3af864a4bb3d44ab8ea9a90eadc3f4da216d7f96c5ec55c6afb8843623a7c3593d2d5bbab9e1a3a64996e4eb01529a4b5df0749f0b12f2d9b91c0f8b924aa36ef948e48b8370ed935fdc0a44e54cd798c4697131455582f8f6f0a0cfa2121cc36972a7a094a400f6bbbd9d5a98dca74554be308da54ea7f983", 0xb0, 0x9}, {&(0x7f0000000980)="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", 0x1000, 0x1f}, {&(0x7f00000000c0)="84f7584573b134348c264e2aafbbf03f3826b30558e779f422de48ef6d6c5368a209bb41", 0x24, 0x5}], 0x10000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f6175746f6465667261672c6e6f656e6f7370c8b6c1ec072cbc10fd54635f64656275672c6e6f747265656c6f672c626172726965722c61636c2c6673636f6e742c61707872616973652c000000000000000000"]) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df946a, 0x13c) 13:29:42 executing program 1: bpf$PROG_LOAD(0x6, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:42 executing program 0: chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:42 executing program 2: bpf$PROG_LOAD(0x7, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:42 executing program 5: mkdir(0x0, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:42 executing program 2: bpf$PROG_LOAD(0x8, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:42 executing program 1: bpf$PROG_LOAD(0x7, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:42 executing program 0: mkdir(0x0, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 417.283154][T13670] loop4: detected capacity change from 264192 to 0 13:29:42 executing program 3: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, r1+10000000}}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000180)={{}, {r2, r3+10000000}}, 0x0) 13:29:42 executing program 2: bpf$PROG_LOAD(0x9, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:42 executing program 5: mkdir(0x0, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 417.459113][T13678] loop4: detected capacity change from 264192 to 0 13:29:42 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000280)='btrfs\x00', &(0x7f0000000740)='./control\x00', 0x7, 0x6, &(0x7f0000002b80)=[{&(0x7f0000000780)="03dacc8e52c6e43be39996fbf0209a", 0xf, 0x1}, {&(0x7f00000007c0)="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", 0xff, 0x8}, {&(0x7f0000002980)="bf34c632e876a6baad3a7c7decc194c382745efe99324293878cfebd769ad3400bc525ffd7ae3dae218c0151b25786dfebe2087e3214e23f639405209c461f0ec5bfce185739633df5466a0ba7de94b03e0017ff2e796a4a66c1a3f57a268d191371f2f978f4f4bab97e0b9c87581ed8091cf24ba01e9a02bc81e57bc016b6676b3fd65660a9db488f566fd041948df77269ebeb9044602467ca7c3c87d5f4497c346c3873614b854fe71c2d93cd548540b27fb2c3f56f56ec6ceda1c5be4a175c94a3e960c2c15756def641cfbd5ee7e679c3f0", 0xd4, 0x8}, {&(0x7f00000008c0)="9ae0c806500c147f160e759f7f4b8f34080e210fcfc5be9cd515b38b246ef4c9", 0x20, 0x1ff}, {&(0x7f0000000900)="b8debf3927b7e04e1711f94e84d8deca89ed0b", 0x13, 0x10000}, {&(0x7f0000002a80)="a08b195f14b77f394585040229180237031165af058a283ae754a3935a6117c73ea9f20b59fea2350547cfe8ba32410f2f60d2ed779363f43dcd171397bcb86a700a61b43c9db637755ad7ca8021f0d0005e90678721d358dda85befaf1675a93de2478f3ae7b8af6527a94edae23063a51f51dd95632fd0952933e949d0ab0ee90ec85d51a825c6ccfcbedf3a9071aa82eb2ab5ea5904e725e958afd81a703298be9d121a439c9de85be158c14f9a2e48a2e98374a315c04402182ca281cbea83ccce79770348f0a428617c925d054d6d4b690b39", 0xd5, 0x2}], 0x1108001, &(0x7f0000002c40)={[{@flushoncommit='flushoncommit'}, {@barrier='barrier'}], [{@audit='audit'}, {@dont_hash='dont_hash'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'minix\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@hash='hash'}, {@measure='measure'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000003100)='./file0\x00', &(0x7f0000003140)='trusted.overlay.upper\x00', &(0x7f0000003180)={0x0, 0xfb, 0x57, 0x3, 0x3f, "e5bc27ee3418690d75c9c4c032ac0894", "8f739f4146e775596d112009b5c533ee273bcccf9704a3f5292cda4429985d141389d98bae29e82c9115b304607fea0274675476cca88cf04ca379008a0c0801b74a"}, 0x57, 0x3) chown(&(0x7f0000000000)='./control\x00', 0xee00, r2) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffe46, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="70890f4edefda4858fc2bf652458712a4e06a4c9e939def98ccd79c1a4a3d5df2df2069e8aaaab1182d3657b00cfbf191f0f73db403af8649eb40b89c32c9009200dedb3bbd59ddf4ad144d7cd2d4167fc3ee10501f4525790ac6cb040516ab224df84", 0x63, 0x10000}, {&(0x7f0000000180)="089fb5e37598805498d04469f11471620a39ec57088fee88462d1b7b8cac2d2361e6a38e50b1338869360916d73741492c3391059e41cadac9cebee1c09c6ffeec62fb5cf58ea5f27ac4b8d4d2c1865f850b7ee77a14674d76073842ca1c017132eb30ef37aaec0af84d4b7daf6e59c9df938d41296df2c35174dc98eb7bc3c4146fdbf6580ca47784ea6db5abc5a535d6ee754e4b924cc7699926cb140e82aa58c9ec68fd9e92869d72", 0xaa, 0x6}, {&(0x7f0000000300)="99f1044fd3fefd0e5cea132d19f3c7ec535ec61e6619b9a4e2912405a4b1ae6b6e3c1281c1182e1c76ae5b5fcd58995c52c541eaabaf33ea4eef8876bc9734b81291fd24d96291b64edef2fc12993813d6d8ba417c83fc09f685582416e9446c92d35ea86c7d576901aabc51764fc83da059d7aefb779db26b2b354619ace1a3a3879503073ffe7444ed7dff504b1fd6bae6ee338477cd4fc01a4e009a86a2f2e3132d2d550cb65cac50891df4889826611238cc073f1352f05496f59100a9dcc61f82", 0xc3, 0x8}, {&(0x7f0000000400)="7aae40f73df4c0b482431e9f95e022b486951877458e803ad4a13aa68ee4d22b4b723e091675ed5f2cffe7ca9fc2b7f4473f0c231c6634a1a4a152c579b186a7622732b0de8dcac5ae154d28c145030a66065323d9e605226b270e465e8587a0816e79da12e266e847ff09cdd0521f0d8d53b1741686bdb536caf9f98d308fd37e4a3521bc8d2a3de004c9a34cca95486bc076d43ddbe9b606ad471a0da7b408072c8a92ea142babf36d1c48bd92616649715c0012f4ceaa79e59caf3273504a75068af0790ee50b84d3e40c41f2c79b7d2a6b008b71406d0aceb8a55f04a38644f649458f42a7c789c6adaaa586a116429d8f57", 0xf4, 0x5}, {&(0x7f0000000500)="8f85406d6ce14223b462907f556f337880d0ef4773ccb2f089237085c552c30df969649f047523051664a88add2f63472c20529ca6fe0cf89d8f22f3d4d941663541a7fbfabe64417d56079723d84e8e5cbdc7fd0357d080fb90721b0bef1b08107936219cf5e1ca173749c2fc7a77cb86ca48f33c4b4614aeb10158b433da4bd0366979ea219bd65bcde07225b3d45d7f970029883d7867d6e5557f2f8cb302c6b1a9b5a97584b43dc1903aafd56dc600bff038d90dacde38fd59", 0xbb}, {&(0x7f0000000980)="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", 0x1000, 0x1000000000000000}, {&(0x7f0000000240)="148f069c0c31769e8c366e98b4635c6b3bd7d219dbb8", 0x16, 0x4}, {&(0x7f0000001980)="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", 0x1000}], 0x3000000, &(0x7f0000000680)={[{}, {'@'}, {}, {'-[\'!'}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\\xd5[(^):{%&/M#:)$,'}}, {@dont_measure='dont_measure'}, {@smackfsdef={'smackfsdef', 0x3d, '\xe7/'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r1}}]}) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x3c6676dfc1115dca) r3 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r4) syz_mount_image$gfs2(&(0x7f0000002d00)='gfs2\x00', &(0x7f0000002d40)='./control\x00', 0x3d, 0x3, &(0x7f0000002f40)=[{&(0x7f0000002d80)="4d112eb94a04d42c7f3bdece09fae77f303dc473174e645362fb95255e", 0x1d, 0x597}, {&(0x7f0000002dc0)="36f5608c456179a31d271b436a484595f9f1f5237437a916f8a125170035dac7de81ea0f010df7d7bbf38c8770f23806c8aa841c75e4a3aade14be653086e007f7f27a4e8b0a", 0x46, 0xfffffffffffffff9}, {&(0x7f0000002e40)="a16e77b6056e1ef84a2d50eba516b3d359c12f783d546fb85ebed828b0bb2065e95187a68181da83dd6d857348c42a34cc95ec6775a0a4e0d4fd131f6ad73beb5fa35d496dd1b120fd4ad13b1bd5e96176f4eff741d789036a476ad83a35dc2ac92a4cd1012233a47e64f396f322cc9fca6af77cbbeaa458dbce2ee69a2c1b3cc7db67dd603227306e45fcd9ff4ecff608b42ac98bda21c01ba86f14570df4f3c955210120c6f82d1eb267b875c2c8764067668b650dfbd463f23effb74a8772546f5efe340a7e51ba7746522d6313530378d6092055", 0xd6, 0x1b83e191}], 0x0, &(0x7f0000002fc0)={[{@quota_off='quota=off'}, {@errors_withdraw='errors=withdraw'}, {@discard='discard'}], [{@subj_user={'subj_user', 0x3d, 'system_u'}}, {@smackfshat={'smackfshat', 0x3d, '@'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'smackfsdef'}}, {@euid_lt={'euid<', r4}}, {@smackfshat={'smackfshat', 0x3d, '.-$'}}, {@subj_role={'subj_role', 0x3d, ':\'/\''}}, {@appraise='appraise'}]}) 13:29:42 executing program 1: bpf$PROG_LOAD(0x8, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:42 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:'}, &(0x7f0000000140)={0x0, "f3ec17e5708a04f901c82b2a2e2e6368575f46df12d715feacaf1d1e76772c5c0cf2f43bd889e6c2331d86c9cda8ec9a53c11cc817c8cb600e1ee7d3c67274af"}, 0x48, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, r0) 13:29:42 executing program 0: mkdir(0x0, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:42 executing program 2: bpf$PROG_LOAD(0xa, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:43 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(0x0, 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:43 executing program 2: bpf$PROG_LOAD(0xb, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:43 executing program 1: bpf$PROG_LOAD(0x9, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 417.996036][T13706] loop4: detected capacity change from 256 to 0 13:29:43 executing program 2: bpf$PROG_LOAD(0xc, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x31, 0x0, &(0x7f0000000100)) 13:29:43 executing program 0: mkdir(0x0, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 418.109377][T13706] loop4: detected capacity change from 264192 to 0 13:29:43 executing program 2: bpf$PROG_LOAD(0xd, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 418.199812][T13706] SELinux: duplicate or incompatible mount options [ 418.398479][T13706] loop4: detected capacity change from 256 to 0 [ 418.497808][T13726] loop4: detected capacity change from 264192 to 0 [ 418.555363][T13726] SELinux: duplicate or incompatible mount options 13:29:43 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) socket(0x10, 0x800, 0x7) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:43 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(0x0, 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:43 executing program 1: bpf$PROG_LOAD(0xa, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x10000000) 13:29:43 executing program 2: bpf$PROG_LOAD(0xe, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:43 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(0x0, 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:44 executing program 2: bpf$PROG_LOAD(0xf, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:44 executing program 1: bpf$PROG_LOAD(0xb, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:44 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x2, 0x0, &(0x7f0000000140)) 13:29:44 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(0x0, 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:44 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(0x0, 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:44 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbff, 0x80000000}, 0xc) 13:29:44 executing program 2: bpf$PROG_LOAD(0x10, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:44 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 13:29:44 executing program 1: bpf$PROG_LOAD(0xc, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:44 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(0x0, 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:44 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:44 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @rand_addr, @multicast2}, 0xc) 13:29:44 executing program 2: bpf$PROG_LOAD(0x11, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:44 executing program 1: bpf$PROG_LOAD(0xd, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:44 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000080)=0xc) lstat(&(0x7f0000000040)='./control\x00', &(0x7f00000000c0)) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x0, 0xae}, 0x2) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r3 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$chown(0x4, r2, r4, r5) ioctl$TUNSETGROUP(r1, 0x400454ce, r5) chown(&(0x7f0000000000)='./control\x00', 0xee00, r5) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474d4d6e8, 0x5f37900f6c944c6e) 13:29:44 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:44 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x19, 0x1, &(0x7f0000000040)=@raw=[@call], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:45 executing program 2: bpf$PROG_LOAD(0x12, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:45 executing program 1: bpf$PROG_LOAD(0xe, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:45 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x8) rmdir(&(0x7f0000000040)='./control\x00') open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={@private2={0xfc, 0x2, [], 0x1}, 0x6b}) 13:29:45 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:45 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:45 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) connect$bt_sco(r0, 0x0, 0x0) 13:29:45 executing program 2: bpf$PROG_LOAD(0x13, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:45 executing program 1: bpf$PROG_LOAD(0xf, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:45 executing program 2: bpf$PROG_LOAD(0x14, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="c02fed3b6722"}, @in={0x2, 0x0, @multicast1}, @xdp}) 13:29:45 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:45 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x80000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./control\x00') chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:45 executing program 1: bpf$PROG_LOAD(0x10, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:45 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:45 executing program 2: bpf$PROG_LOAD(0x15, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:45 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:45 executing program 3: socket$inet(0xa, 0x3, 0x0) 13:29:45 executing program 1: bpf$PROG_LOAD(0x11, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:45 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:46 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) r4 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r4) ptrace$setopts(0x4206, r4, 0x0, 0x200044) fcntl$setown(r2, 0x8, r4) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000000c0)='./control\x00', 0x24000, 0x4a) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:46 executing program 2: bpf$PROG_LOAD(0x16, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:46 executing program 1: bpf$PROG_LOAD(0x12, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:46 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:46 executing program 3: socket(0x10, 0x3, 0xa) 13:29:46 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:46 executing program 2: bpf$PROG_LOAD(0x17, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:46 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:46 executing program 1: bpf$PROG_LOAD(0x13, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:46 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000040)="000ad2", 0x3, 0x0, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) 13:29:46 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:46 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 13:29:46 executing program 2: bpf$PROG_LOAD(0x18, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:46 executing program 1: bpf$PROG_LOAD(0x14, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:46 executing program 3: bpf$OBJ_GET_MAP(0x3, 0x0, 0x0) 13:29:46 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000000080), 0x72a, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000400)='vcan0\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./control/file0\x00', 0x7fff, 0x5, &(0x7f0000000380)=[{&(0x7f00000000c0)="2a6d257a41cd89821f57e7488e5edc656be59329482d", 0x16, 0xed}, {&(0x7f0000000180)="d8e7b873541015ed7f27e38a986473eba56bf01fe5ec24ece8eeb269ffc06aa3fae1eec7ea7a783f7edf33516fbd4963b33447f2fde84adc20b139db1c5f1bb8bd9eff5fb91bc7afdd4ddd4148fa09ce00dfb123c61e1d702019e5e6527aeccef5cacf631d2947cb94b3f8b5cce308157c72afd85fa15515f82fdce86e7ba45a46e8e625aad5bf490dc5936089f5b1013d448a1fb858930d5557d36cfc33a2896c0f46a33aad519ec367e757c6cd2c7d0ec253e6b872276d88b6d7842c74e7b93bb4", 0xc2, 0x3}, {&(0x7f0000000100)="9868173853ae8ca71a2304143de9ed48161cf51fc0da6e33b8887c475117796827be828f401c1f9726d43bb507e1ede836c2c1f2", 0x34, 0x1000}, {&(0x7f0000000300)="4dfba7cd5141606f6116c2be81ec0cd7a0495a4cdeb5c13717d04e9bec9637104fee4f828ce7093bca706b79e7daeeaa8063e977f70c2f638f36a70eb0eaaab5468e3970f6074d97ece1a36eb7264d95504bb8c84aeea57b57ad9c8801edbe76", 0x60, 0x4}, {&(0x7f0000000280)="7af063a722c3e7aea61f96b9097d5bf3496b82f9dd88cd5ff9b762e42614d8ff475f4b7c1f3bc137166916", 0x2b, 0x5}], 0x2041000, &(0x7f0000000580)=ANY=[@ANYBLOB="706172743d2078303030303030301e8f1bf3ae89a07f13d9c090a13001000100383030302c756d61736b3d30303030303030303030303030303030303134368834302c7375626a5f747970653d285d2c21262f282c00d12336b25ea03c23b1333d5bb5fe399fdc102f79c490fc90b77a3c85b8fbe4428648bd2e378d52296fed4dc7d890954722d6ceed79543c931aeba1daef2dde6d4216c3047fd968efdb7af5e6d8693735ab1b2ede99d0abe88895f37e505f9eeba0287087bcd26632"]) open(&(0x7f0000000480)='./control/file0\x00', 0x0, 0x140) chown(&(0x7f0000000000)='./control\x00', 0xee00, r2) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000980)=@newtaction={0x5c50, 0x30, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [{0x268, 0x1, [@m_skbmod={0x140, 0x5, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x70, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa, 0x4, @local}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x1697, 0x435a, 0x4, 0x1, 0x401}, 0xc}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @link_local}, @TCA_SKBMOD_DMAC={0xa, 0x3, @dev={[], 0x12}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}, @TCA_SKBMOD_SMAC={0xa}, @TCA_SKBMOD_DMAC={0xa, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}]}, {0xa6, 0x6, "bb5613fc5beafae6fc944ec61067c7b6ae0e82ae03fa90f87f9421e60a0eea549b9394bf2b0dbdc7369dff09c2c364d21cd6420a34fc87ef663a3a938d8f99219bd343dc957eb88ba24620e91e485b793a5a6996136f115c3b6886ed47f6496ca8519d046154b2417c246bf802c22512065862bcdbf6945d44b336675b815d31fc8856c55151a03cf01b6c97024963ccb9abb7498d2e47d4b4e9416e85b876c2b7cd"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x4}}}}, @m_simple={0x124, 0x20, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x40, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x5, 0x1, 0x4, 0x8, 0x5}}, @TCA_DEF_DATA={0xa, 0x3, 'vcan0\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x25, 0x860, 0x20000000, 0xdaca, 0xa7b8}}]}, {0xba, 0x6, "1311addbba0197304c91c2c8f8f64dd78916b9e4f2514c6165d39c9223b6af157f75ce012abf4ba473a2ee3d00e75c0dcf7b99d4f058a236f07f40d6fff8827efe7186f2604d8247e89c6f70b4b2be2171af73d9dee8f704fecc634bbe0772fb766dfe0bebb635339468644170f4d586ddc458b39214ef7e384976b34db9ec570e4d6a40082de028896683ffd43f925e6e8c16961b0d5a6f25594173d7868ee269ff360f54c567c8f1259f671c30c78f29f542443e96"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, {0x8a4, 0x1, [@m_police={0x8a0, 0x3, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x820, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0xfffffffd, 0xfffffffb, 0x9, 0x8000, 0x35af, 0xffffffff, 0x1, 0x5, 0x2, 0x3, 0x19, 0x5, 0x6, 0xffff, 0x3, 0x9, 0x3, 0x9, 0x800, 0x5, 0xffffffe1, 0x800, 0x100, 0x9, 0x1, 0x0, 0x1f, 0x80000000, 0x5, 0x10001, 0x5, 0xba, 0x3, 0x8, 0x8, 0x2, 0x8, 0x3, 0x4, 0x2, 0x9, 0x10000, 0x4, 0x4, 0xaf, 0x0, 0x2, 0x20, 0xa9e, 0xfff, 0x7, 0x8, 0x8001, 0xff, 0x1, 0x0, 0x1, 0x40, 0x401, 0x2, 0x7, 0x9, 0x3, 0x7, 0x0, 0x6, 0x6, 0x560d, 0x204000, 0x9, 0x3, 0x4, 0x7, 0xfffffffa, 0x1, 0x7f, 0x5, 0x100, 0x5, 0xff, 0x20, 0x0, 0x0, 0xa1d, 0x20, 0x5, 0x0, 0x6, 0x1, 0x7f, 0x0, 0x6f47, 0x1000, 0x24000000, 0xad, 0x1, 0x4, 0x1, 0x80000001, 0x4, 0x1, 0x8, 0x2, 0x1, 0x1f, 0x8000, 0x1, 0xfffffe01, 0x2, 0xb4788de, 0x4, 0x1, 0x9, 0xb28, 0xffffffe0, 0x8, 0x1, 0x0, 0x7, 0x7, 0x1827751c, 0x1, 0x0, 0x1, 0x5, 0x8, 0x80, 0xffffffff, 0x8, 0x4, 0x4, 0xbf, 0xe5f1, 0x1ff, 0x40, 0x1ff, 0x9740000, 0x8, 0x8000, 0x3f, 0x7, 0x400, 0xa97, 0xd7, 0x9, 0x1ff, 0x3, 0x9, 0x0, 0xdc, 0x80, 0x5, 0x62, 0x1, 0x41e0, 0x6, 0x3, 0x6, 0xfffffc7f, 0x13b, 0x9, 0x3, 0x0, 0x9, 0x20, 0x6, 0x200, 0x10000, 0x505, 0x1, 0xd8, 0x9, 0x9, 0x37b, 0x8000, 0x7fff, 0xefd, 0x6, 0x21c, 0x3, 0x8000, 0x4, 0x9, 0x7, 0x1000, 0x1, 0x7, 0x629, 0x7fff, 0x10000, 0xda, 0x8, 0x0, 0x2b, 0x9, 0x1, 0x3, 0x1, 0x0, 0x0, 0x6173, 0x5, 0x8, 0x3, 0x0, 0x3, 0xc2, 0x0, 0x6f6, 0x9, 0x5, 0x1784, 0xe6a, 0x7fffffff, 0x5755, 0x100, 0x101, 0x4, 0x4, 0xc, 0x3, 0x6, 0x1, 0x0, 0xfd, 0x2, 0x10, 0x9, 0x2, 0x1, 0x5, 0x80000000, 0x8b, 0x2, 0x4, 0x7, 0xc3, 0x9, 0x4, 0x8, 0x4, 0x7093, 0x5, 0xfff, 0x8, 0x6, 0x10001, 0x7, 0xdc, 0x4, 0x6, 0x7, 0x80, 0x8, 0x8]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x473}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x68d, 0x80, 0x7, 0x2, 0x4, 0x5, 0x0, 0x3, 0x3, 0x7fff, 0x4, 0x7, 0x8001, 0x7, 0x6, 0x6, 0x1, 0x7, 0x4, 0xff, 0xfffffff8, 0x5, 0xff, 0x9, 0x9, 0xfffffffa, 0x4, 0x4, 0x0, 0x0, 0x2, 0xd8, 0x782, 0x5, 0x1, 0x4, 0x5, 0xb7e, 0x10000, 0x4, 0x5, 0x7, 0x9, 0x5, 0x80000001, 0xfffffffe, 0x8, 0x5, 0x3, 0x1f, 0x7ff, 0x10000, 0x8000, 0x1, 0x2, 0xa93b, 0x4, 0x40, 0x0, 0xffff, 0x20000000, 0x4, 0x4, 0x8, 0x80, 0x9, 0x4, 0x80, 0x8001, 0xfffffff8, 0x6, 0x0, 0x5, 0x3, 0xfffffffc, 0x8, 0xdfb, 0x1, 0x100, 0x4, 0x1f, 0x8, 0x4, 0x1f, 0x10001, 0x0, 0x97a5, 0x6, 0x400, 0xffff8616, 0xa7, 0x3, 0x9, 0x4, 0x0, 0x10685b2, 0x6, 0xfffff000, 0xd1, 0x40, 0x4, 0x400, 0x8, 0x7, 0x6, 0x1, 0xfffffffb, 0x80000000, 0x3f, 0x7fffffff, 0x400, 0x8, 0x3, 0x0, 0x7fff, 0x3, 0x100, 0x9, 0x10001, 0x3f, 0x5, 0x800, 0x13e1, 0x1, 0x200, 0x30a7, 0x7, 0x1, 0x53, 0x7, 0x7, 0x3, 0x101, 0x4, 0x80000000, 0x31, 0x9, 0x6, 0x0, 0x8, 0x7, 0x1f, 0x695, 0x4, 0x80000000, 0x7fff, 0x10001, 0xfffffffb, 0x0, 0x7, 0x5, 0x53, 0x1, 0x5, 0x800, 0x2, 0x31b0, 0x7, 0xffffffa9, 0xfffffffe, 0x6, 0x8000, 0x6, 0x2, 0x5, 0x9573, 0x3, 0x40, 0x6, 0x7, 0x1ff, 0x4, 0x0, 0x81, 0xc4, 0x735, 0x7328, 0x5, 0x1, 0x5, 0x730c, 0x96, 0x9, 0x5, 0x5, 0x6, 0x0, 0x3, 0x9, 0x5, 0x4, 0x31, 0x6, 0x6, 0x8, 0x2, 0xfffffff8, 0x1f, 0xda4, 0x9, 0x6bf, 0xf6ac, 0xffffffff, 0x6, 0x6, 0x3, 0x4, 0x1, 0x7ff, 0xda, 0xad7d, 0x6, 0xae0, 0x8, 0x5, 0x56fb, 0x4613, 0x7, 0x83, 0x6, 0x2, 0x40, 0x5, 0x2, 0x200, 0xff8, 0x2, 0x5, 0x9, 0x1, 0x7609, 0x9, 0x5, 0x200, 0x216, 0x6, 0x4, 0x5, 0x9, 0x3, 0xffff930f, 0x8, 0x0, 0x4, 0x3ff, 0x60, 0xa3d, 0x200, 0x9, 0x9, 0xfffffff9, 0x7, 0x1000, 0x80000000, 0x4, 0x80]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x8}]]}, {0x57, 0x6, "5f3e1995327bf9759792dee1028fa57e1354d30a0fca5b72d80a7c0d27d3ea69f7edf0b7fc0116d2b8a7bec280907ad5852fbb080c2ba22d16a1d9662dfa6199a852372cf812d0cc61b98884d53e0ffb156cd4"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}, {0xcc, 0x1, [@m_vlan={0xc8, 0x12, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x448}]}, {0x94, 0x6, "0f71f0870938ea118cd5ca8ef7789dc0fa4b5647a848e452f3a8d3b878d4349e4aac812b4560ab0b6c493e417afd26956494b2420542ffced793e8592d619a6021419061509cbcc90e1be7d1b1f2df9df4a9055553cde95c4d3e70c25668a3d44af1c53c2ae570c7cb4f5f92e811b535fc7a8c489a82c83bcabf83b5982a2297b6bf1ff7920112b19d187c17afd08368"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}]}, {0x5064, 0x1, [@m_vlan={0xf8, 0x2, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x68, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0x8, 0xf4, 0x0, 0x2, 0x6}, 0x3}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x1, 0x0, 0x7, 0xffff9a76, 0x20}, 0x1}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x52e}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x24e, 0x1, 0x2, 0x40, 0x8}, 0xffb}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}]}, {0x65, 0x6, "fa12493547658a4a9e1cf814da87cdadbccce69b9d2dd955cbb37026c229aa3bcb0334348fc643aa996095230d497edb649775b80de8314050b2e53d6abd9859f475b3c29151f96a2d95dd83d1bc8f83c0729d6f1540eabbe84f7300a5f42c9f3a"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}, @m_sample={0x128, 0x0, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8}]}, {0xf4, 0x6, "61364557e25ee92f058602368900f00670c0dc62a2a25a9f8f2c508653eaa8f57a0f1004039e21d8312d5601a6aeeb7018a4d78813de7583b904a4741d524b28fe2cd365a67213c5d9364b76d5de8e10c229e59d03583734cb3c5848ac53ebde49236b40cf3e918148cce24be9f72c27ec0e587d36c5a041ade4258495f563a15dbedac0558f845e6fd1cb23024ddfb5876d3417850945ae32b65ca73e4ca39b660c18556f4cf1a31aa7495281e11335da2687a775dc4665b470eeee1432ea3050ba19ddc13135f3d8b91434acad8b9de616bbf8ef9950c9857c6aa4d32948fe4a7809d9af7270b926197167e5b978f6"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_pedit={0x4d64, 0xb, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4c98, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xef8, 0x2, {{{0x7, 0x2, 0x5, 0x6, 0x7}, 0x1, 0x7, [{0x1, 0x5, 0xfff, 0x15a, 0x6, 0x8137e986}, {0x6baa7c8c, 0x7, 0x1, 0x81, 0x80000000, 0x4}, {0x6, 0x100, 0x800, 0xffffffe0, 0x940, 0x3}, {0x9, 0x7ff, 0x9, 0x6, 0x2}, {0x8, 0x367, 0xb3, 0x3, 0x7, 0xfffeffff}, {0x4, 0x2, 0x1, 0x5, 0x7f, 0x3270}, {0xaf8f, 0x401, 0x80, 0x6, 0x100, 0x80}, {0x5, 0x1, 0x100, 0xb8be, 0xaa27, 0x1f}, {0x3ff, 0xfffffffe, 0xffff, 0x558, 0xf5, 0x200}]}, [{0x110, 0x0, 0xfffffffd, 0x200, 0x4f5f, 0x8}, {0x0, 0x10001, 0x2, 0x1, 0x200, 0x2}, {0x8, 0x1, 0x8000, 0x401, 0x5, 0x6}, {0x9, 0x64, 0xff, 0x5, 0x3, 0x20}, {0x7fffffff, 0x8, 0x800, 0x10001, 0x3ff, 0x8}, {0x7, 0x2, 0x1e, 0x3a43, 0x8001, 0x3f}, {0x35, 0xffffffff, 0x2, 0x8f1d, 0xc0, 0xbf}, {0x2, 0xc4, 0x4, 0x7ff, 0x3, 0xffffffff}, {0xad4, 0x10001, 0x0, 0x2, 0x1, 0x7b49}, {0x7, 0x4270, 0x0, 0x100, 0x5, 0x2}, {0x4d, 0x6, 0x3, 0x10001, 0x0, 0x1f}, {0x8, 0x1, 0xffffffff, 0xffffffff, 0x400, 0x7}, {0x74, 0x9, 0x8, 0xfffffffa, 0x8, 0x100}, {0x1f33, 0x9, 0x0, 0x16, 0x0, 0x7ff}, {0x400, 0x1, 0x2, 0x3f, 0x0, 0x5395bcda}, {0x9e, 0x9, 0xbc, 0x1, 0x8, 0x3f}, {0x9e42, 0x3, 0x2, 0x7, 0x4, 0x8000}, {0x81, 0x4, 0x3, 0x4, 0x2, 0x26d}, {0x1f, 0x5, 0x8000, 0xfffffffb, 0xfffffffc, 0x2}, {0x3, 0x1, 0x7, 0xffffffff}, {0x200, 0xfffffffd, 0x43c, 0x9c, 0x2, 0x9}, {0x7fff, 0x4, 0x2, 0x0, 0x1, 0x3}, {0x1fe, 0xfffff800, 0x0, 0x5440, 0x6, 0x10001}, {0x7, 0x800, 0x5, 0x6, 0x80000000, 0x2}, {0x2, 0x400, 0x7, 0xffffffff, 0x7, 0xa6a5}, {0x7f, 0x2, 0xfffffff9, 0x8, 0x72f3, 0x84e}, {0xabbeb8d, 0x7, 0x7, 0x7601, 0x0, 0x4}, {0x2, 0x5, 0x343, 0x6, 0xd7a9, 0xffffffff}, {0x4, 0x8, 0xfffffeff, 0x8, 0x1, 0x7}, {0x6b, 0x80000001, 0x8, 0x1, 0x2, 0x81}, {0x8, 0x4, 0x8, 0x4, 0x3f, 0x4}, {0x0, 0x0, 0x6, 0x2, 0x4, 0x5}, {0x401, 0x5, 0x308d, 0x81, 0x7ff, 0xff}, {0x7, 0xca8, 0x3, 0x9, 0x1f, 0x4}, {0x7, 0xf8d2, 0x0, 0xffffffc1, 0x4, 0x222}, {0xc02, 0x3, 0x0, 0x2, 0x350, 0x7}, {0x81, 0x9, 0x6, 0x81, 0x9, 0x1}, {0xd5, 0x3ff, 0x7ff, 0x7, 0x2, 0x9}, {0x5, 0x200, 0x0, 0x3, 0x1f, 0x4}, {0x6, 0xf0, 0xfffffff9, 0xe2, 0x1, 0x6}, {0x9bf, 0x0, 0x167, 0x40, 0x9, 0x7}, {0x7, 0x1000, 0x1, 0x1ff, 0x800, 0xfffffffe}, {0x8cf, 0x9, 0x4, 0x4, 0x5, 0x2}, {0x48000000, 0x1, 0x663eaeb7, 0x3f, 0xaa, 0x20000}, {0xffff, 0x5, 0x10000, 0x9, 0x2, 0xe769}, {0xfffffffa, 0x4fcb, 0x200, 0x80000001, 0x401, 0x8}, {0x4743, 0x200, 0x7f, 0xfff, 0x5, 0x40}, {0x100, 0x1, 0x8, 0x9, 0x1, 0x9}, {0x5, 0x5, 0x51, 0x4, 0x0, 0x676}, {0x6, 0x3, 0x3, 0x5, 0x1, 0x7}, {0x4, 0xffff, 0x8001, 0x5, 0x6, 0x7}, {0x1, 0x5654, 0x907, 0x5, 0x4188f2bf, 0x1ff}, {0x482b, 0x8001, 0x5, 0xffff, 0x1606738c, 0xb1}, {0x5, 0xffffba42, 0x5, 0xd0, 0xffff, 0x7fffffff}, {0x8001, 0x401, 0x2, 0x8001, 0x5, 0xffffff19}, {0xa31, 0x7, 0x7, 0x1, 0x8, 0x6}, {0x4b2eb3b6, 0x80, 0x1, 0x0, 0xc7, 0x9}, {0x0, 0x7, 0x9, 0x4, 0x9, 0x80000000}, {0x10001, 0x56, 0x3, 0xfffffff8, 0x5, 0x8}, {0x1, 0x7, 0x2, 0x10000, 0x0, 0x9}, {0x6, 0x3f, 0xffffffff, 0x101, 0xff, 0x5}, {0x3ff, 0x80000001, 0x1, 0x1, 0x8, 0x6}, {0x4, 0x4, 0x4, 0x11, 0x40, 0x2}, {0x1, 0x3, 0xfb1, 0x1, 0x8, 0x8}, {0x8001, 0xffffffff, 0x10001, 0x4, 0x1, 0x3f}, {0x80, 0xd23, 0x1, 0xb340, 0xfd1, 0x81}, {0x401, 0x8, 0x3ff, 0x1f, 0x3, 0x2400000}, {0x2, 0x6, 0xffffff11, 0x101, 0xffff887f, 0xfffffffa}, {0x4898, 0x6, 0x8887, 0x400, 0x4, 0x2c56}, {0x1, 0x7, 0xfffffffb, 0x9, 0xff, 0x1}, {0x5, 0x101, 0x1, 0x2, 0xff, 0x1}, {0x9, 0x10000, 0x4, 0x4, 0x10000, 0xa709}, {0x8000, 0x8, 0x7, 0x200, 0x7f, 0x2}, {0x20000000, 0x27, 0x0, 0x7f, 0x3, 0x4}, {0x40, 0x755a, 0x5, 0x92b7, 0x9, 0x10000}, {0xffffffff, 0x1, 0x425, 0x1, 0x18fcc5f0, 0x7fff}, {0x2, 0x20, 0x9f, 0x1f, 0x2, 0xe3d2}, {0x0, 0x51e, 0x7, 0x0, 0x8, 0x3f}, {0x401, 0x5, 0x4325, 0xfb25, 0x2, 0x1000}, {0x9, 0x7, 0x3, 0x4, 0x80, 0x3e6b}, {0x6, 0x81, 0x20, 0x5, 0x1, 0x5}, {0x8000, 0x8, 0xfffffffd, 0x1, 0x4, 0x400}, {0x80000001, 0x2500000, 0x9, 0xfffffffd, 0x8, 0x81}, {0x9, 0x401, 0x5, 0x1, 0x10001, 0x1e4}, {0x56, 0x80, 0x3ff, 0x7ff, 0x6, 0x1}, {0x9, 0x9, 0x1ff, 0x101, 0x8000, 0x2bc}, {0x854a, 0x5, 0x101, 0xfffff800, 0x2, 0x1}, {0x800, 0x8, 0x8, 0x7f, 0x8000000, 0x24a6}, {0x7, 0xffff, 0x2, 0x5f, 0x1, 0xfffffffb}, {0x2, 0xbdc, 0x3, 0x6, 0x4, 0x7}, {0x1, 0x7ff, 0xc4e, 0x3ff, 0x43, 0x100}, {0x40, 0xff, 0x1, 0x9, 0x46, 0x6}, {0x80, 0x4, 0x6, 0x3, 0x800, 0x401}, {0x8, 0xc50d, 0xfffffff8, 0x6, 0x2, 0x4}, {0x8, 0x2, 0xfffffffc, 0x6, 0x8, 0x5}, {0x7ae, 0x0, 0x7, 0x2, 0x9, 0xffff}, {0x8, 0x9, 0x100, 0x8, 0x9, 0xffffffc0}, {0xff, 0xffff, 0x3, 0xfffffffe, 0x1, 0x4}, {0x3, 0x1ff, 0x6, 0x1, 0x5, 0xfffffffe}, {0x7ff, 0x0, 0xffff0000, 0x3, 0x4, 0x3}, {0x3f, 0x7fffffff, 0x4, 0x19d4, 0x6, 0x1}, {0x3, 0x3, 0x9, 0x7588, 0x40, 0x20}, {0x7, 0x5c, 0x20, 0x5, 0x2, 0x401}, {0x101, 0xfffffffa, 0x5, 0x3, 0x9c36, 0x2}, {0x5, 0x35ac, 0x5, 0x5, 0x9, 0x5}, {0x9, 0x6, 0x1ff, 0xffffffff, 0xcff, 0x9}, {0x1f, 0x1ce, 0x401, 0x20, 0x3, 0xff}, {0xbe, 0xb29b, 0xff, 0x1, 0x1, 0xff}, {0xcb, 0x3ff, 0x7fffffff, 0xfffffffa, 0xb91c}, {0x3, 0x0, 0x7fff, 0x3f, 0x0, 0xffff}, {0x5, 0x7fff, 0x3, 0x1ff, 0x10001, 0x401}, {0x100, 0x100, 0x4, 0x1b2, 0x4, 0x40}, {0x9, 0x0, 0x4, 0x2, 0xa38c, 0x2}, {0x8, 0x8, 0x401, 0x4, 0x48b, 0x2}, {0xffffffff, 0x0, 0x8, 0xfffffffd, 0x3, 0x2}, {0x81, 0x100, 0x9, 0x80000000, 0x8, 0x3}, {0x7, 0x400, 0x17e894db, 0x4, 0x800, 0x80}, {0x7ff, 0xc7a, 0x80000001, 0x100, 0x6, 0x5}, {0x4, 0x7, 0x400, 0x4, 0x7fff, 0x2}, {0x2, 0x10000, 0x1024000, 0x5830, 0x1f9, 0xffffff68}, {0x9, 0xffffffff, 0xfffff800, 0x6, 0x8, 0x5}, {0x80000001, 0x5, 0xff7b, 0x3, 0x2, 0x7f}, {0x2, 0x7ff, 0x7, 0x6, 0xffffffff, 0x7f3d}, {0x1ff, 0x10001, 0x9, 0x8000, 0x41f, 0x29c}, {0x7f, 0x5e, 0x200, 0x8, 0x9a26, 0x8}, {0x101, 0x8b1, 0x3, 0x6, 0x6000, 0x7fffffff}, {0x3ff, 0x800, 0x5, 0x0, 0x4, 0x3}, {0x0, 0x0, 0x7fffffff, 0xfffffffc, 0x5, 0x8}], [{0x4}, {0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x4, 0x1}, {0x7}, {0x2, 0x1}, {}, {0x5}, {0x1, 0x1}, {0x4, 0x1}, {0x5}, {0x3}, {}, {0x2, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x2}, {0x5}, {0x3}, {0x2}, {0x1, 0x1}, {0x5}, {0x5}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {0x2, 0x1}, {0x2}, {0x5, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x2}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x2, 0x1}, {0x3}, {0x2, 0x1}, {0x1, 0x1}, {0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3}, {}, {0x1}, {0x5}, {0x2, 0x92fdf9117d968a7b}, {0x2, 0x1}, {0x5, 0x1}, {0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x5}, {0x1}, {0x2, 0x1}, {0x5}, {}, {0x5, 0x1}, {}, {0x2}, {0x3, 0x1}, {0x5}, {}, {0x4, 0x1}, {0x5}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x5}, {}, {0x4}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1}, {}, {0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x1}, {0x6, 0x1}, {0x4}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0x4, 0x1}, {0x1}, {0x5}, {0x3}, {0x1}, {0x2}, {0x5, 0x1}, {}, {0x4, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x2}, {0x3, 0x1}, {0x0, 0x1}, {0x5}, {0x5}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x4}, {0x2}, {0x4}, {0x4}, {0x1, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x1}, {0x3}, {0x0, 0x1}], 0x1}}, @TCA_PEDIT_KEYS_EX={0x10c, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x3c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}]}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_KEYS_EX={0x120, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x54, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x54, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS={0xe68, 0x2, {{{0x7, 0x8000, 0x5, 0x30, 0x5}, 0x8, 0xdb, [{0x4, 0x80, 0xfffffff7, 0x101, 0x7, 0x6}, {0xe1, 0xff, 0x2d, 0x7, 0x6, 0x200}, {0x2, 0x7, 0x2, 0x8001, 0xffffff00, 0x4}]}, [{0x5, 0x4, 0xcd, 0x7f, 0x1, 0x3}, {0x7, 0xfffffffd, 0x9, 0xffffffff, 0x730b, 0x6c}, {0xffff, 0x2, 0x6, 0xffffff81, 0xfff, 0x8000}, {0xffffff80, 0x2, 0x80000000, 0x9, 0x400000, 0x9}, {0x1ff, 0x9, 0x31, 0x5, 0x46, 0xfffffac3}, {0xffffffff, 0x406, 0x80000000, 0x8, 0x14d, 0xcd}, {0x8, 0x401, 0x40, 0x2, 0x0, 0x1000}, {0x1f, 0x8, 0x6, 0x7, 0xabcd, 0xffff}, {0xfffffe00, 0x7f, 0x3, 0xfffffffc, 0x81, 0x1}, {0x6, 0x3, 0xfffff800, 0x9, 0x1, 0x3a00d503}, {0x4, 0x1ff, 0x78, 0x4, 0x6, 0xfff}, {0x10001, 0x3, 0xfffffe68, 0x3, 0xffff, 0x3}, {0x6, 0xbd87, 0x44c, 0x7ff, 0x100, 0x9}, {0x1, 0x6, 0x1, 0x7, 0x0, 0x24}, {0x80, 0x8, 0xef0, 0xae, 0xfffffc01, 0x7ff}, {0x9, 0x2, 0x3, 0x94f, 0x18, 0x8}, {0x4, 0x7, 0x7f, 0x56b0, 0xffffffff, 0x40}, {0x7f, 0xffc00000, 0x7f, 0x5ed8, 0xf2}, {0x1, 0x0, 0x4, 0x2, 0x10000, 0x7}, {0x7f, 0x2, 0x7, 0x10001, 0x9ab, 0x7fffffff}, {0xb408, 0x8, 0x6, 0x3, 0x5, 0x9}, {0x1ff, 0x3aa, 0xfffffff7, 0x6, 0xa5, 0x9}, {0x487e0fc0, 0x5000000, 0x6, 0x6b72c861, 0x5, 0x9}, {0x8e, 0xf9, 0x8, 0x7fffffff, 0x7, 0x7e}, {0x10001, 0x2, 0x3ff, 0x3, 0x0, 0x7}, {0x8, 0x73a2, 0x80, 0x3ff, 0x40, 0x1}, {0x49e4, 0x1, 0x7, 0x2, 0x80, 0x7}, {0x1b96000, 0x7, 0x3, 0xfffffffe, 0x2, 0x6}, {0x4, 0x1000, 0x5, 0x8cd, 0xc90, 0x4}, {0x6, 0xf4, 0x800, 0x1, 0xe34, 0x7}, {0x0, 0x4, 0x9, 0x1000, 0x401, 0x10000}, {0x8, 0x10001, 0x7, 0xfe0, 0xfff}, {0x3, 0xb, 0x2, 0x800, 0x7, 0x3}, {0x5, 0x0, 0x40000000, 0x3, 0x7, 0x1}, {0x401, 0x7, 0x4, 0x9, 0x296, 0x9}, {0xc, 0x3, 0x2, 0x5, 0x3, 0x2}, {0x3, 0x6, 0x5, 0x54c, 0x7, 0x2}, {0x1, 0x1, 0x1, 0x0, 0x10000, 0x371}, {0x3, 0x401, 0xfffffff9, 0x6, 0x9, 0xf4d}, {0x1ff, 0x1, 0xfc, 0x1000, 0x0, 0xffff8001}, {0x9, 0x8, 0x38200, 0x20, 0x0, 0x4}, {0xff, 0x6, 0x40, 0x7, 0x1, 0x9}, {0x2, 0x20, 0x1f, 0xba, 0x0, 0x2}, {0x8001, 0x3, 0x9, 0xfffffff7, 0x1a, 0x1}, {0x6, 0x6b, 0x8, 0x9, 0x2, 0xffffff20}, {0x6, 0x3, 0x0, 0x77, 0x0, 0x5}, {0x7, 0x7ff, 0x5, 0xeb9, 0xfffffd46, 0xca}, {0x40, 0x4, 0x9, 0x6, 0xff, 0x20}, {0x401, 0x97a0, 0x3, 0x7, 0xecc, 0x8}, {0x401, 0x4, 0x3, 0x800, 0x1f, 0x4}, {0x9, 0x5, 0x0, 0x80000001, 0x6, 0x9}, {0x0, 0xb09, 0x988d, 0x5, 0x400, 0xfffff398}, {0xeef, 0x3ff, 0xfffffffc, 0x1ff, 0x8, 0x1}, {0x389, 0x7, 0x400, 0x0, 0x80000000, 0x80000001}, {0xff, 0x6, 0x5aa, 0x2, 0x6, 0x6}, {0x4, 0x2, 0x29bab041, 0x896b, 0xff, 0xfffffffe}, {0x2, 0x8, 0xfffffffe, 0x1809c479, 0x5, 0x85b}, {0x20, 0x80000001, 0x6, 0x5, 0x0, 0x7f0}, {0x3f, 0xffffff1e, 0x8c12, 0x4, 0x3, 0x1}, {0x3, 0x7, 0x4, 0x4, 0x80, 0x2}, {0x4, 0x7, 0x5, 0x6, 0x59cf, 0x49}, {0x3f, 0x80000001, 0x101, 0x5, 0xa726, 0x9}, {0x7, 0x9, 0x0, 0xffffffff, 0x7, 0x18}, {0x0, 0x2, 0xed5, 0x7, 0x1000, 0xfffffffc}, {0x68, 0x5, 0x81, 0x1, 0x4, 0x7ff}, {0x2, 0x80000001, 0x10000, 0x7, 0x8, 0xd46}, {0x1ff, 0xf, 0x0, 0x3f, 0xfffffffc, 0x200}, {0xffff, 0x6f, 0xce, 0x0, 0x8, 0x1}, {0xffff, 0xfff, 0x7f, 0x2, 0xd, 0x7fff}, {0x20, 0x7, 0x3da, 0x3, 0x0, 0x3}, {0x6, 0x10001, 0x5, 0x4, 0x3, 0x3}, {0x2, 0x5, 0x9, 0x80000001, 0x0, 0x1}, {0xfffffffc, 0x2, 0x5, 0x8, 0x5, 0x28977055}, {0xd6, 0x5, 0x10000, 0x0, 0xd7}, {0x1000, 0xff, 0x0, 0x5, 0x4, 0x6}, {0x4, 0xf16, 0x8, 0x5, 0x401, 0xc34}, {0x3, 0x0, 0x0, 0x101, 0x6, 0x300000}, {0x7ff, 0x7, 0x1, 0x80000001, 0xff}, {0x3, 0x400, 0x5, 0x4, 0x8, 0x23}, {0x1, 0x8001, 0x3, 0x9, 0x7fffffff, 0x2}, {0x8000, 0x0, 0x0, 0x0, 0x101, 0x9}, {0x7, 0x7fffffff, 0x40000000, 0x8, 0x2, 0x3}, {0x800, 0x3, 0x401, 0xb356, 0xfffffbff, 0x9}, {0x4, 0x5, 0x3, 0xb4, 0x101, 0x400}, {0x72, 0x10000, 0x8, 0xfb, 0x1, 0x9}, {0x63d, 0x8, 0x9, 0x9, 0x3, 0xe0}, {0x5, 0x3d, 0x7fff, 0x2, 0x5, 0x625d}, {0x1, 0x7fffffff, 0xffffffff, 0x80000001, 0xfb06, 0x20e}, {0x8, 0x0, 0x241, 0x4, 0x9, 0x4}, {0x3, 0x80, 0xa6b1, 0x81, 0xfffff801, 0x1}, {0x8, 0x319, 0x1ff, 0x7f, 0x8000, 0x1}, {0x2, 0x3, 0xfff, 0x1, 0x5c, 0x6}, {0x9, 0x9, 0x8, 0xfffffff9, 0x1, 0x1}, {0x9, 0x401, 0x1a05, 0x3, 0x67f, 0x1000}, {0x2, 0x9, 0x6, 0x2, 0x8001, 0x4}, {0x1, 0x40, 0x8, 0x7, 0x10001, 0x9}, {0x1, 0xfffffff9, 0x1f, 0x80a, 0x8000, 0x7}, {0x10001, 0xa3e, 0x0, 0xffffffff, 0x6, 0x3}, {0x6, 0x3f, 0x8, 0x862b415, 0xfffffffc, 0x1ff}, {0x1, 0x7, 0x2, 0x79, 0x6, 0x574}, {0x0, 0x5, 0x9, 0x1000, 0x1, 0x400}, {0x4, 0x7, 0x2, 0xfffff000, 0x4, 0xffff4fe7}, {0xfac6, 0x400, 0x5, 0x3, 0x7, 0x6}, {0xad22, 0x2, 0x224, 0x80, 0x2, 0xfffff763}, {0x3, 0x8, 0x7, 0x6, 0x6, 0x3}, {0x6, 0x9, 0x996, 0xfff, 0x80000001, 0xd57}, {0x5, 0x1ff, 0x3, 0x9, 0x0, 0x6}, {0x81, 0x4, 0x3ff, 0x0, 0x7ff, 0x9}, {0x2, 0xfffffffe, 0x80000000, 0x856b, 0x101, 0x7}, {0x2, 0x4, 0xfffff476, 0x575, 0x8000, 0x1}, {0x4, 0xfffffffa, 0x3, 0x8, 0x1, 0xde}, {0x0, 0x2, 0x2, 0x100, 0x3, 0x5}, {0x7, 0x4, 0x7ff, 0xa8b7, 0xfffffff8, 0xff}, {0x4, 0x8, 0x4, 0x0, 0xffffffff, 0x1f}, {0x100, 0x100, 0x8, 0xe0, 0xff, 0x868}, {0x2, 0xd7b, 0x80, 0x6, 0xd5, 0xd}, {0x0, 0x7ff, 0x8, 0x1, 0x5, 0x800}, {0x3, 0x5, 0xfffffe73, 0x7fffffff, 0x3, 0x10000}, {0x101, 0x9, 0xfffffe00, 0x1, 0xfc4, 0xbd}, {0x3, 0xa69, 0x4, 0x6, 0x8001, 0x1}, {0xe7, 0x3ff, 0x5, 0xbe5, 0x7, 0x7ff}, {0x2, 0x4, 0x6, 0x7fff, 0x7, 0x7}, {0x1, 0x1a2, 0x1, 0x2, 0x9, 0x6}, {0x7fffffff, 0x1, 0x7, 0x7fffffff, 0x9, 0x4}, {0x1, 0x6, 0x436, 0x6, 0x7fff, 0x7fffffff}, {0x401, 0xe7b9, 0x5b90, 0x5, 0x3, 0x7}, {0x23b, 0x0, 0x10001, 0x4, 0xfffffffb, 0x842f}, {0x1, 0x4, 0x3, 0x4, 0xffffffff, 0x1ff}], [{0x1}, {0x5, 0x1}, {0x4, 0x1}, {}, {0x5}, {0x4}, {0x3, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x5}, {0x4}, {0x2}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x5}, {0x1}, {0x4, 0x1}, {0x2, 0x1}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x1}, {0x2}, {0x5, 0x1}, {0x3, 0x1}, {}, {0x3}, {0x3, 0x1}, {0x5}, {0x5}, {0x2}, {0x5}, {0x4, 0x1}, {0x2, 0x53b1d1ba84438ed1}, {0xf4777efc562e98aa, 0x1}, {0x0, 0x1}, {}, {}, {0x2, 0x1}, {0x4}, {0x1, 0x1}, {0x5}, {0x5}, {0x1}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x4, 0x1}, {0x65e3af12b92666e9}, {0x3}, {0x3, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x4}, {0x5}, {0x3}, {0x0, 0x1}, {0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x1}, {0x1, 0x1}, {0x1}, {0x2, 0x1}, {0x3}, {0x3}, {0x0, 0x1}, {0x2}, {0x4, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x2}, {0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x6}, {0x1, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x2}, {0x0, 0x1}, {0x1, 0x1}, {0x5}, {}, {0x5, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x4}, {0x5}, {0x4}, {0x2, 0x1}, {0x2, 0x1}, {0x3}, {0x6}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0x4, 0x1}, {}, {0x5}, {0x4}, {0x3}, {0x4}, {0x0, 0x1}, {0x5}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x2}, {0x1, 0x1}, {0x5}, {0x5}, {0x5, 0x1}, {0x3}, {0x4, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x0, 0x1}], 0x1}}, @TCA_PEDIT_PARMS={0xe38, 0x2, {{{0x4, 0x0, 0x20000003, 0x3, 0x8}, 0x4, 0x4, [{0x4, 0x2, 0x0, 0x56, 0x7fffffff, 0x100}]}, [{0x4, 0x3f, 0x8, 0x40, 0x3}, {0x1, 0x5, 0x7f, 0x80000, 0x8, 0xee44}, {0x3, 0x0, 0x9, 0x5, 0x5, 0x8001}, {0x401, 0x3, 0x10000, 0x8000, 0x3, 0x6}, {0x6, 0x4c71, 0x499, 0x5, 0x1, 0x2}, {0x6, 0xffffff6e, 0x80000001, 0x3f, 0xff, 0x7}, {0x3, 0x2, 0x9, 0x4, 0x8001}, {0x80000000, 0x0, 0x6d52cec6, 0x2f, 0x3, 0x8}, {0x32, 0x3, 0x154, 0x40, 0x22f, 0x1}, {0x8a9, 0x180, 0x1, 0x8, 0x4, 0x8000}, {0x5, 0x3, 0x90000, 0x4c9e, 0x1ff, 0xb7}, {0x4, 0x8, 0x4, 0x8, 0x2, 0x1}, {0x7ff, 0xe0d4, 0x4, 0x0, 0x318d3a0c}, {0x8, 0x1be, 0xfff, 0x0, 0x3}, {0x10001, 0x8, 0xf8, 0x6, 0x200, 0x4}, {0x101, 0x200, 0x25, 0x8, 0x6, 0x75}, {0x2061, 0x81, 0x3, 0x1000, 0x7, 0x7}, {0x4, 0x0, 0xffffffff, 0x0, 0x1, 0x5a3b}, {0x8, 0x191, 0x81, 0x9, 0x5, 0xde9}, {0x10001, 0x2, 0xd34, 0x3, 0xea, 0x6}, {0x80000000, 0x400, 0x40, 0x100, 0x0, 0x4012}, {0x3, 0x0, 0x6, 0xf8000000, 0x6, 0x6}, {0x3, 0x4, 0x7, 0x7fff, 0x5d000000, 0x5}, {0x3ff, 0xd0, 0x2, 0x6, 0x0, 0xff}, {0xff, 0x3, 0x5, 0x80000000, 0x6a6, 0x7}, {0x3f, 0x2, 0x3ff, 0x32, 0x10000, 0x98}, {0x3, 0x3, 0x3ff, 0x3a5, 0x5}, {0x0, 0x1, 0x8, 0x4, 0x9, 0x422048c7}, {0x9, 0x80, 0x7, 0x9, 0x8, 0x800}, {0x8, 0x0, 0x1ff, 0x9, 0xd1dd, 0x8}, {0x90000000, 0x3, 0x10001, 0x4, 0x100, 0xffffffff}, {0x80, 0x2, 0x9, 0x7f, 0x0, 0x1}, {0x4, 0x10001, 0x6, 0x4, 0x19bc, 0xd40e}, {0x7, 0xc14, 0x8000, 0x81, 0x36d, 0x1}, {0x7fff, 0x8, 0x2, 0x7ff, 0x4, 0x1f}, {0x9, 0x2, 0x401, 0x80000000, 0x5, 0x6}, {0xff, 0x7fff, 0x875, 0x1, 0x67a6, 0x1f}, {0xfffffffc, 0x9, 0x0, 0x8, 0xfffff37d, 0x6}, {0x800, 0x3, 0x7, 0xffffffff, 0x7ff, 0xffffffba}, {0x10000, 0x7dd, 0x6, 0x0, 0x1000, 0x91a}, {0xfffffff7, 0x5000000, 0x0, 0x1f, 0x6, 0x2}, {0x4, 0x50d, 0x3, 0x6, 0x0, 0xce5c}, {0x3ff, 0xacb0, 0x3, 0x9, 0x9, 0xb3fe}, {0x0, 0xa2, 0x1000, 0x7f, 0x3, 0x9}, {0x400000, 0x4, 0x1, 0x7, 0x8, 0x4}, {0x18a7, 0xbb9, 0x7, 0xffff, 0x7fffffff}, {0x81, 0x4, 0x1, 0x8000, 0x4, 0xfffffffb}, {0x10000, 0x5, 0x401, 0xa8f, 0x5, 0x7}, {0x0, 0x100, 0x8000000, 0x6, 0xfe38, 0x8001}, {0x2fa, 0x7ff, 0x100, 0x3, 0x4a, 0x4563ca4}, {0x7, 0x3, 0x80, 0x101, 0x0, 0x6}, {0x1, 0x6b, 0x6, 0xe1f, 0x800, 0x6}, {0x8, 0x1, 0x4, 0x2, 0x7, 0x4}, {0x4, 0x8, 0xffffffff, 0x2}, {0xd1, 0x100, 0x1, 0x800, 0xfffffff7, 0x3}, {0x6, 0x16, 0xfffffffa, 0x1, 0x7ff, 0x826}, {0x1, 0x71, 0x1f, 0x5, 0x6, 0x8}, {0x9b6, 0x10000, 0x1, 0x9, 0x8001, 0x3}, {0x4, 0x40, 0x59c, 0x3ff, 0x6, 0x6}, {0x5, 0x17a8cb1d, 0xfffffffe, 0x2, 0x0, 0x7}, {0xb6e, 0x5, 0x1, 0xa3, 0x1}, {0xe6, 0x6, 0x1, 0x6, 0x8000, 0x71}, {0x2df, 0x5, 0x10001, 0x8, 0x40, 0x1}, {0x400, 0x5, 0x3, 0x1, 0x5, 0x800}, {0x6, 0x1, 0x6, 0x400, 0x6, 0xfffffffe}, {0x6, 0x20, 0xc9e, 0x22d, 0x8, 0x80000000}, {0x101, 0x7, 0x1, 0xf983, 0x80000000, 0x4}, {0x1ff, 0x7fffffff, 0x5, 0x9, 0x3ff, 0x8feb}, {0x4, 0x1, 0x0, 0x80000001, 0x3, 0x10000}, {0x0, 0xed0d, 0x6, 0x1, 0x5, 0x10001}, {0x5, 0xfff, 0x0, 0x20, 0x1}, {0x8, 0x8, 0x6, 0x0, 0x81, 0x1}, {0x7, 0xfffffffd, 0x0, 0x3ff, 0x8, 0x9}, {0x9, 0x0, 0x5, 0x101, 0x5}, {0x7, 0x4, 0x101, 0x9, 0x4, 0x8}, {0x6a5b0d32, 0x2, 0xe8c, 0x8, 0x101, 0x4}, {0xffff0001, 0xdaae, 0x4, 0x400, 0x1, 0x554}, {0x400, 0x7fffffff, 0x7c5, 0x5, 0xfff, 0x7}, {0xffffffff, 0x5, 0x3, 0x81, 0x75}, {0x0, 0x101, 0x5, 0xe3e, 0x3f, 0x1}, {0x200, 0x80, 0x1d9, 0x1, 0x40, 0xd08}, {0x2, 0x4, 0x100, 0x8, 0x9, 0x6}, {0x2, 0x3f, 0x2, 0x1f, 0x5f, 0x6}, {0x1, 0x0, 0x80, 0xb91, 0x3, 0x1}, {0x9, 0x2, 0x0, 0x1ff, 0x724, 0xf97f}, {0x5, 0x3, 0x4, 0x5, 0x7fff, 0x4}, {0x400, 0x25e, 0x6, 0x5, 0x6, 0x5}, {0x4, 0x2, 0x8a3, 0x7, 0x7fff, 0x8}, {0x0, 0x4, 0x7, 0xfffffff7, 0x5, 0xda91}, {0x4f, 0x1, 0x7, 0x40000000, 0x7, 0x4}, {0x6, 0xffff, 0x0, 0x9, 0x40, 0x3}, {0x8, 0x7, 0x1000, 0x0, 0x80, 0xffffffc1}, {0x101, 0x5f7, 0xb9, 0x200, 0x40, 0xffffff00}, {0x5e291152, 0x100, 0x2, 0x2, 0x5, 0x400}, {0x80, 0x6, 0x0, 0x1ff, 0x2, 0x7f}, {0xf0, 0x400, 0x8, 0xffff9222, 0x81, 0xe0000000}, {0x5, 0x80000001, 0x3da, 0x6, 0xfff, 0x9}, {0x4dc, 0x1, 0x3b9, 0x8000, 0x3}, {0x3, 0x1, 0x31e3, 0x6, 0xd0, 0x9}, {0x32, 0x7, 0xfff, 0x5, 0x4, 0x7ff}, {0xb9df, 0xdd, 0xffff, 0xa6f4, 0x2, 0x3ff}, {0xffff8000, 0x5db4f332, 0x7fffffff, 0x5, 0x7, 0x2}, {0x4, 0x1, 0x1, 0x4, 0x3, 0x1000}, {0xffffffff, 0x3, 0x6, 0x0, 0x8001, 0x2}, {0x1, 0xff, 0x1, 0x800, 0x36d, 0x1}, {0x3, 0x3ff00, 0x1, 0x55, 0x3f80000, 0x8}, {0x80, 0x5, 0x9, 0x4, 0x9, 0xc4}, {0x6, 0xfffffffa, 0x5, 0x80, 0xff4f, 0x4}, {0x80000000, 0xfff, 0x10001, 0xc15, 0x9, 0x7}, {0x3ff, 0x6, 0xffffcd05, 0x6, 0x2, 0x2}, {0xfffffffd, 0x6, 0x10001, 0x81, 0x1f, 0xe55e}, {0xffffadbd, 0xffffffff, 0x0, 0x3, 0x4f9, 0x4}, {0x200, 0xb4f, 0x4, 0x0, 0x401, 0x2}, {0x2, 0x100, 0x4, 0x2, 0x5, 0x6}, {0x1, 0x6, 0x8, 0x2, 0x2, 0x80000000}, {0x7, 0xfffffffb, 0x800, 0x8, 0x100, 0x80000000}, {0x7, 0x9e, 0xffffffe0, 0x0, 0x80, 0xe3}, {0x8, 0x2, 0x7, 0x7c, 0xbd, 0x8001}, {0x5, 0x20, 0x6, 0x5457c52d, 0x400, 0xb3}, {0x0, 0x3, 0x9, 0x4, 0x1f, 0x10000}, {0x8, 0x0, 0xf37f, 0x7, 0x0, 0x800}, {0x8, 0x9, 0x965, 0x2, 0x0, 0x81}, {0x3ff, 0x8, 0x0, 0x0, 0xfff, 0x3f}, {0x1, 0x1, 0x2, 0x10001, 0x2, 0x80000000}, {0x5, 0x2, 0x9, 0x8001, 0x6, 0x1ff}, {0x4, 0x7, 0x8, 0x1, 0x7, 0xffffff33}, {0x3ff, 0x0, 0x9, 0x9, 0x9, 0x9}, {0x8000, 0x8001, 0x6, 0x2, 0x7, 0xffff7fff}], [{0x3}, {0x0, 0x2}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {0x2}, {0x4, 0x1}, {0x3}, {0x1}, {}, {0x5}, {0x3, 0x1}, {0x5}, {0x2, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {0x3, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x1}, {0x4}, {0x4, 0x1}, {0xf, 0x1}, {}, {0x4, 0x1}, {0x3, 0x1}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x2}, {0x1}, {0x3, 0x1}, {0x2}, {0x0, 0x1}, {0x2}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x1}, {0x5, 0x1}, {0x5}, {}, {0x5, 0x1}, {0x5, 0x1}, {0x3a5bbddaf35cf76f, 0x852859fb5bca3b4}, {0x2}, {0x5, 0x1}, {0x1, 0x1}, {0x5}, {0x2}, {0x1}, {0x5, 0x1}, {0x2, 0x868626d512f7b653}, {0x3, 0x1}, {0x2}, {0x3, 0x1}, {0x1}, {0x1}, {0x2}, {0x1, 0x1}, {0x2, 0x1}, {0x3}, {0x5}, {0x3}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2}, {0x2, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x2, 0x1}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {0x2}, {0x5}, {0x3}, {0x3, 0x1}, {0x5, 0x1}, {}, {0x4}, {0x4, 0x1}, {0x4, 0x1}, {0x4}, {0x2}, {0x2}, {0x5, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0x5}, {0x9}, {0x5, 0x1}, {0x3, 0x1}, {0x3}, {0x4}, {0x4}, {0x1, 0x1}, {}, {0x4}, {0x5}, {0x4, 0x1}, {0x3, 0x1}, {0x4}, {0x2, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {}, {0x3, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0xa0, 0x5, 0x0, 0x1, [{0x54, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x964c82dd0215a5e8}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_KEYS_EX={0xd0, 0x5, 0x0, 0x1, [{0x44, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x3c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}]}, {0x4c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x9ab3e2794421f256}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xeb0, 0x4, {{{0x1b, 0xd1, 0x10000000, 0x6, 0x800}, 0x9, 0x5, [{0x80000001, 0x3, 0x9, 0xffffffff, 0x10001, 0x2}, {0x2, 0xbf, 0x7ba9dbf6, 0x3, 0xfffffc72}, {0x3f, 0x30, 0x6, 0x0, 0x1444473d, 0x1f}, {0x2, 0x0, 0x800, 0xfff, 0x5}, {0x3ff, 0x6, 0x9, 0x200, 0x8, 0x7}, {0x2, 0x7, 0x620, 0x3ff, 0x1, 0x3}]}, [{0x1ff, 0x0, 0x6, 0xef, 0x4, 0x4}, {0x8000, 0x8, 0x7ff, 0x3, 0x5, 0x3f}, {0x2cb, 0x0, 0xfffffe95, 0x9, 0x2, 0x595d}, {0x2f3, 0x7fffffff, 0xffffffff, 0x9, 0xc53d, 0x3}, {0xfffffff0, 0x8848, 0x1, 0x1f, 0x101, 0xa715}, {0xfffffff7, 0x6, 0x8, 0x0, 0x7ff, 0x8}, {0x800, 0x9dd, 0x2, 0x5, 0x0, 0xffffff7f}, {0x1, 0x4, 0x1f, 0x1, 0x6, 0x8}, {0x0, 0x1, 0x5, 0x7, 0x1, 0x1}, {0x9, 0x76b, 0x0, 0x4, 0x1, 0x6}, {0x27, 0x3, 0x5, 0x7, 0x1, 0x87}, {0xffffffff, 0x5, 0x4, 0x1, 0x6, 0xffffffff}, {0x4, 0x800, 0x9, 0x8, 0xa7, 0x1000}, {0x7, 0x8, 0x9, 0x9, 0x3, 0x7e7}, {0x0, 0x81, 0xdb, 0x9, 0x8, 0xd}, {0x40, 0x1, 0x400, 0x2, 0x5, 0x2}, {0x0, 0x1535793f, 0x4, 0x4, 0x0, 0x7b}, {0x100, 0x5, 0xffff, 0x1f, 0x8, 0x1}, {0x5, 0x81, 0x6, 0x9, 0x1, 0x2}, {0x4, 0x10001, 0x7f, 0x0, 0x81, 0x1}, {0xdffa, 0x5ce7, 0xfffffffe, 0x1, 0x80000001, 0x9}, {0xfffffff8, 0x1f, 0x8fa, 0x5, 0x1ff}, {0x236bc1a8, 0xfffffeff, 0x6, 0x4, 0x1, 0x1c6}, {0xffff, 0x2, 0x800, 0x1e, 0xffff, 0x1}, {0x5, 0xfff, 0x1, 0x9, 0x5, 0x100}, {0x6, 0x8, 0x3f, 0x6, 0x20, 0xd1}, {0xffff8001, 0x9, 0x7fffffff, 0x53a8, 0x9, 0x2}, {0xc6, 0x3, 0x20, 0x0, 0x5, 0x7fffffff}, {0x5, 0x404000, 0xffffffe1, 0x4, 0x2, 0x7}, {0x4, 0x101, 0x3, 0x3, 0x10001, 0x10000}, {0x100, 0x1, 0x8, 0x40, 0x0, 0xe53e}, {0x8, 0x7fffffff, 0xfffffeff, 0x4, 0x400, 0x2}, {0x9, 0xff, 0x6, 0x10001, 0xffffffe0, 0x101}, {0xffffffff, 0x8, 0x36, 0x5, 0x8, 0x7}, {0x6, 0x449, 0x5, 0x401, 0x5, 0x4}, {0x401, 0x8, 0x7, 0x6755, 0x2, 0x200}, {0x4, 0x0, 0x8001, 0x0, 0x2, 0xed}, {0x1, 0xda, 0xff, 0xde8, 0x8, 0x4}, {0x7, 0x81, 0x9, 0x700, 0x9, 0x10000}, {0x552c, 0x200, 0x0, 0x302e, 0x100, 0x100}, {0x9, 0xfff, 0x0, 0x1f, 0x24000, 0x8}, {0x10000, 0x2, 0x3, 0x5, 0x1, 0x2}, {0x7, 0x3ff, 0xfffffff9, 0x775, 0x7, 0x20}, {0x81, 0x1000, 0x2, 0x8, 0x4, 0xffff}, {0xffffffff, 0x18, 0xb7, 0x2, 0x4, 0x3}, {0x5, 0x403d, 0xbb5, 0x4, 0x8, 0x7}, {0x3, 0x2, 0x40, 0x80000001, 0x991d, 0x8}, {0xacf1, 0x3, 0x800, 0xd1, 0x4, 0x4}, {0x5, 0x1000, 0x4, 0x8, 0x8}, {0x9, 0x7, 0x200000, 0xca3d, 0x2, 0x9}, {0x8, 0x9, 0xf08, 0x3, 0x80000001, 0x9d51}, {0x6, 0x3, 0x0, 0x40, 0x0, 0x80000000}, {0xfff, 0xfffffff9, 0x6, 0x7, 0x3ff, 0x2}, {0x4, 0x800, 0xfffffffc, 0xf8, 0xea000000, 0x4}, {0x1c, 0x3, 0x1, 0x5, 0x200, 0x2}, {0x4, 0x1, 0x9, 0x50000, 0x7, 0x2}, {0x3, 0x6, 0x4, 0x2, 0x8, 0x101}, {0x1000, 0xff, 0x8, 0xaab, 0xaf, 0x4}, {0x6, 0xce1, 0x7, 0x3, 0xfffffbb1, 0x86}, {0x8, 0x0, 0x9, 0x4, 0x7, 0xfff}, {0x1, 0x7f6, 0x3e0b, 0xfffff801, 0x5, 0x40}, {0x3, 0x2, 0x2d63, 0x1000, 0x5, 0x1}, {0x0, 0x1, 0x8, 0x4, 0x7, 0x62c5}, {0x7, 0xef6, 0x14, 0x2, 0x7, 0x9}, {0x5, 0x5, 0x2, 0x83, 0x2, 0x81}, {0x80000000, 0x5, 0x2, 0x3, 0x4a01, 0x9}, {0x2f, 0x4a84, 0x1f, 0x7, 0x5}, {0x1, 0x9, 0xffffffff, 0xe722}, {0x5, 0x7fffffff, 0x380, 0x1, 0xf048, 0x6}, {0x0, 0xff, 0x0, 0x6, 0x10001, 0x7}, {0x9, 0xfffffffc, 0x6, 0x0, 0xfffffffa, 0x3ff}, {0x6, 0x1, 0x101, 0xc6f0, 0x6, 0xfffffff7}, {0x76, 0x100, 0x9, 0x3f, 0x1, 0x5}, {0x5, 0xb26, 0xfff, 0x8000, 0x400, 0x3}, {0x1, 0xfffffff8, 0x80000001, 0x8, 0x1000, 0x7}, {0xfffffffb, 0x3, 0xa0, 0xf1ba, 0x4d33, 0x200}, {0x9, 0x0, 0x6, 0x6, 0x6, 0xffffffe1}, {0x1, 0x10001, 0xfffffffc, 0xfffffff7, 0x66, 0xfffffffb}, {0x8, 0x8, 0x3, 0x2, 0x9, 0x5}, {0x6, 0xffffffff, 0x3, 0xffffff7f, 0x6, 0x8}, {0x4, 0x8, 0x9, 0x7, 0x2, 0x101}, {0x3ff, 0x9, 0x6e, 0x0, 0x3, 0x7}, {0x1, 0x2, 0x9, 0xd0, 0x2, 0x8}, {0xfffff801, 0x1ff, 0xbac0000, 0x4de, 0x2, 0x2}, {0x6, 0x80000000, 0xff, 0xff, 0x3, 0x4}, {0x94, 0x8000, 0x9, 0xb9e, 0xffff, 0x5}, {0x0, 0x80000001, 0x3, 0x2, 0x0, 0x2}, {0x1, 0x7, 0x10001, 0x5d60, 0xffff, 0x5}, {0x7, 0xa4d, 0xb, 0x2, 0x4e, 0x400}, {0x2, 0xddce, 0x4, 0x1f, 0x6, 0xffffb66c}, {0x5, 0xfffff4cc, 0x2, 0x8000, 0x617, 0x77dbbbaa}, {0x3f, 0x2, 0x3, 0xffffffff, 0x7}, {0x5, 0x5, 0x8, 0x10001, 0x101, 0x7fffffff}, {0x1, 0x0, 0x1000, 0xffffffff, 0xff, 0xbc6f}, {0xecfd, 0x123ee800, 0x10001, 0x75, 0x1, 0x7f}, {0x7de, 0x3, 0x80000000, 0x7, 0x8, 0x5}, {0x7, 0x5, 0x3, 0x240000, 0x40, 0x5}, {0x1, 0x2, 0x783d, 0x6, 0x8, 0x7f}, {0x9, 0x5, 0x7c, 0x2, 0x0, 0x5}, {0x101, 0x1, 0xffff2aa5, 0x9, 0xffff0001, 0x3a31}, {0x2, 0x3, 0x10, 0x1f, 0x800, 0x80000000}, {0x400, 0x1, 0x1ff, 0x28000000, 0x3ff, 0x1}, {0x0, 0xfffffe00, 0x2, 0x200, 0x6, 0x4}, {0xff, 0x827, 0x800, 0x8001, 0x3, 0x6}, {0x9, 0x1f, 0xb4de, 0x5, 0x3ff, 0x6}, {0x1, 0x830, 0x9, 0x20000000, 0xffffffff, 0x3}, {0x10001, 0x7fff, 0x100, 0x2, 0x3, 0x1}, {0x5c, 0xa1c2, 0x6a9, 0x4, 0x9, 0x5}, {0x0, 0xa9, 0x0, 0xab9, 0x1}, {0x4, 0x9773, 0x0, 0x40, 0x6, 0x7fffffff}, {0x8000, 0x52, 0x5, 0x5, 0x80000001, 0x1}, {0xdf96, 0x8001, 0x1, 0x101, 0x70, 0x80000000}, {0xfffffeff, 0xfe, 0x8001, 0x7fffffff, 0x8, 0x6}, {0x8000, 0x800, 0x4, 0x9, 0x18cb, 0x80000}, {0x0, 0x9, 0x1f, 0xffffff01, 0x7ff, 0x10001}, {0x7fffffff, 0x6, 0x1, 0x5, 0x1, 0x6b5f}, {0x7, 0x9, 0xe9, 0x8, 0x10001, 0x5}, {0x1ff, 0x0, 0x0, 0x9afa, 0x9, 0x9}, {0x9604, 0x2, 0x7fffffff, 0x1, 0x100}, {0x8, 0xfc6, 0x1000, 0x6, 0x9, 0x2af}, {0xe98c, 0x8000, 0x0, 0x8, 0x2, 0x1}, {0x0, 0x8, 0x100, 0x3, 0x6, 0x5}, {0x3, 0xffffffff, 0x4665, 0x2, 0x57, 0x100}, {0x3, 0x2f3, 0x4, 0x0, 0x0, 0x8}, {0x3, 0xc000000, 0x7, 0x0, 0x9, 0x80000001}, {0x80000000, 0x3f, 0x5d9c, 0xffffff4d, 0x3, 0x1}, {0x4, 0x8001, 0xc9, 0x4, 0xd733, 0xfe}, {0x65d9f98d, 0x8, 0x0, 0x6, 0x8000, 0x9}], [{0x4, 0x1}, {0x5bfa4eeb6b990daa}, {0x3}, {0x1}, {0x1}, {0x1, 0x1}, {0xbab4826894dbb42d, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0xca503940674b7288}, {0x5}, {0x2}, {0x5, 0x1}, {0x4, 0x1}, {0x4}, {0x0, 0x1}, {}, {0x1}, {0x4, 0x1}, {0x5}, {0x3}, {0x5}, {0x4}, {0x1}, {0x2, 0x1}, {0xddbae541d8873468, 0x1}, {0x2}, {0x5, 0x1}, {}, {0x1, 0x1}, {0x3}, {0x2}, {0x2}, {0x5}, {0x3}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {0x2, 0x1}, {0x5}, {0x1, 0x1}, {0x4}, {0x5}, {0x3, 0x1}, {0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x5}, {0x1}, {0x4, 0x1}, {}, {0x0, 0x1}, {0x2}, {0x1}, {0x7}, {0x3}, {0x2}, {0x1}, {0x0, 0x1}, {0x2}, {0x5}, {0x3}, {0x1, 0x1}, {0x5}, {0x3}, {0x3}, {0x3, 0x1}, {0x5}, {}, {0x5, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x2}, {0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x1}, {0x4, 0x1}, {0x4}, {0x1}, {0x5, 0x1}, {0x4}, {0x2}, {0x3, 0x1}, {0x2}, {0x2}, {0x2, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x5}, {0x1}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x4}, {0x5}, {0x5, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x3}, {0x2}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {}, {0x3}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x4}, {0x3, 0x1}, {0x2}, {0x5, 0x1}, {0x3}, {0x2}, {0x1, 0x1}, {0x3, 0x1}, {0x2}, {0x4}, {0x4}, {0x4, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x3, 0x1}]}}, @TCA_PEDIT_PARMS={0xeb0, 0x2, {{{0x5, 0xffff, 0x20000000, 0x1e66, 0x6}, 0x0, 0x9, [{0x7, 0x1, 0x2, 0xffffffff, 0x1f, 0x7f}, {0x5, 0x5, 0x1, 0x78, 0x5b, 0x8}, {0x8000, 0x56, 0x3f, 0x80000000, 0x1, 0x7}, {0x2, 0x4, 0x8, 0x26cff7f3, 0x93, 0xfffffffa}, {0x7, 0x1, 0x7fffffff, 0x99, 0x7d9f153e, 0x7}, {0x2, 0x4, 0x7, 0xe9, 0xb9, 0xcf5}]}, [{0x9, 0x10001, 0x4, 0x86, 0x5, 0x9}, {0x80000000, 0xf43, 0x6f4c, 0x8, 0x9}, {0x80000001, 0x0, 0x10001, 0x8, 0x1, 0x5}, {0x10000, 0x8, 0x24, 0x2}, {0x5, 0x1, 0x1, 0x4, 0x5, 0x1}, {0x6, 0x3, 0x1, 0xd, 0x0, 0x9}, {0x20, 0x2247, 0x2, 0x1, 0x5, 0x2}, {0x3, 0xda, 0x1, 0x6, 0x4, 0x3f}, {0x401, 0x8000, 0x1, 0x0, 0x68e, 0x7}, {0x1, 0x5, 0x7f, 0x1000}, {0xf3a, 0x0, 0x5, 0x7ff, 0x10001, 0x8}, {0x9, 0x5, 0x521a, 0x5, 0x3, 0xecfe}, {0x10001, 0x5, 0x101, 0x7, 0xffff, 0xfffffff9}, {0x5, 0x3, 0x7b, 0x9, 0x80000001, 0xe6}, {0x8, 0x4e7, 0x3, 0x6, 0x4}, {0xffff, 0x80, 0xff, 0x2, 0x8}, {0x7, 0x4, 0x401, 0x3, 0xffffffff, 0x3}, {0x7f, 0x91, 0x1c4, 0x400, 0x3, 0x5}, {0x2, 0x2, 0x0, 0x8000, 0x4, 0x5}, {0x8, 0x2, 0x8, 0x20, 0x7, 0x8}, {0xffffffff, 0x6, 0x3a, 0x7, 0x2, 0x4}, {0xffffff80, 0x80, 0xffffe92a, 0x400000, 0x9, 0x9}, {0x2, 0x4, 0x3, 0x7, 0x8, 0x8}, {0x9, 0xb2fb, 0x401, 0xffffffff, 0x0, 0xfffffc00}, {0x7ff, 0x9, 0x101, 0x1, 0x2, 0x40}, {0x7, 0x1, 0x7, 0x100, 0x6, 0x80}, {0xfffffffb, 0x6, 0x5, 0x80, 0x7, 0x20}, {0x1, 0x5, 0x800, 0x10001, 0x742bcb1f, 0x5}, {0x5, 0xf4b, 0xffffffff, 0x1, 0x2, 0x5}, {0x7fffffff, 0xa325, 0x0, 0x3ff, 0x3, 0x4}, {0xc32, 0x7, 0x3f, 0x10000, 0x38, 0x1}, {0x80000000, 0x200, 0x0, 0x3, 0x9, 0x81}, {0x400, 0x3, 0x9, 0x8, 0x749, 0x7ef}, {0x40, 0x1186930c, 0x7f, 0x1f, 0x6dd, 0x800}, {0x4, 0x20, 0x80000001, 0x8, 0x3ff, 0x10001}, {0x0, 0x1, 0x1f, 0x3, 0x2000, 0x9}, {0xfe2, 0x2, 0x3f, 0x1, 0x9, 0x101}, {0x1, 0xff, 0x8, 0xaa8, 0x5, 0xffffffff}, {0xa0000000, 0xff, 0x1ff, 0x35, 0xfffffffe, 0x9}, {0x6, 0x100, 0x3, 0x4, 0x6, 0x80}, {0xf5, 0x1ef7, 0x200, 0x8000, 0x401, 0x5}, {0x2, 0x3, 0x1f, 0x912, 0x80000000, 0x9}, {0xd06b, 0xd0ff, 0x1, 0x8, 0x8}, {0x6, 0x5, 0x2, 0x80000001, 0x6}, {0x0, 0x9, 0x9, 0x6817, 0x80000001, 0xed}, {0x1, 0xfffffff9, 0x7, 0x9, 0x9e5a, 0x81}, {0x7, 0x3ff, 0xda5, 0x3, 0x6b32, 0x5}, {0x9, 0x9, 0x2, 0x1, 0x0, 0xfffffff7}, {0x38, 0xfffffff9, 0x0, 0x80000001, 0x1, 0x8}, {0xac70, 0x1, 0x26, 0x5, 0x1, 0x40}, {0x7, 0x9, 0x7, 0x6, 0xffffffff, 0x4}, {0x1d1b, 0x9, 0xc1, 0x1, 0x800, 0xf2}, {0x1000, 0x934, 0x77, 0x4, 0x80, 0x1}, {0xffff, 0x7, 0xeb, 0x7441d6c0, 0x1f}, {0x1, 0x10001, 0x800, 0xfffffffb, 0x8, 0x1000}, {0x4, 0x3f, 0x0, 0x7ff, 0x3, 0x80000001}, {0x1, 0xfffeffff, 0x1, 0x7f, 0x6, 0x1}, {0x19c8, 0x3, 0x96f9, 0x6, 0x1000, 0x4}, {0x1f, 0x9, 0x800, 0x100, 0x0, 0x80000000}, {0xe7b5, 0x5813, 0x6f5, 0x5, 0x2, 0xfffffff9}, {0x1, 0x7fff, 0x4, 0x7fffffff, 0x3, 0x9}, {0xffbd, 0x81, 0x200, 0x10000, 0xa7c2}, {0x0, 0x80000000, 0x3, 0x8, 0x2}, {0x80000001, 0x2, 0x4, 0x55, 0x6, 0x10001}, {0x5, 0x7, 0x3, 0x7, 0x7, 0x8}, {0x6, 0x5, 0x3, 0x9, 0x1, 0x1}, {0x1, 0xfffffff8, 0x6, 0x2, 0x4599, 0x8}, {0x7, 0x1, 0x2, 0xfffffffb, 0x0, 0x3}, {0x2, 0x4b8, 0x812, 0xff, 0x4, 0x539}, {0x0, 0x7, 0x78d6, 0x8, 0x4e5, 0x569c}, {0x7ff, 0x2, 0xffff, 0x8, 0x8, 0x4}, {0x6, 0x2, 0x3, 0xfffffe01, 0x5, 0xc99}, {0x5, 0x1, 0x7, 0xf5a4, 0xdd, 0xffffffa1}, {0xffffffff, 0x10000, 0x1, 0x80000000, 0x9, 0x10000}, {0x400, 0x4, 0x15fc, 0x9, 0xffffffff, 0x9}, {0x2b2, 0x8, 0x0, 0x7e, 0x80, 0x8}, {0x0, 0x1ff, 0x10001, 0x1, 0x5, 0x6e51}, {0xcf6, 0x54ba3293, 0x3, 0x7f, 0x4, 0xfff}, {0x5, 0x1f, 0x5, 0x4, 0x0, 0x8}, {0x5, 0x8, 0x7fff, 0x0, 0xfa, 0x6}, {0x3, 0xfff, 0x1, 0x6a5, 0x1, 0x6}, {0x7, 0x800, 0xfd, 0x1, 0x9, 0x48}, {0xd73f, 0x5, 0xd72, 0x5, 0x1f, 0xffffffff}, {0x81, 0x32e, 0x401, 0xbff, 0x3, 0x9}, {0x6, 0x6, 0x0, 0x3ff, 0x7, 0x8}, {0x1, 0x5, 0x2, 0x875, 0x86d, 0x945}, {0x8000, 0x8, 0x100, 0x3f, 0x8, 0xfd}, {0xb0, 0x7, 0x6, 0xfffffffe, 0xcbf, 0x3}, {0x9, 0x5, 0x3, 0x2, 0x4, 0x7}, {0x3ff, 0x1, 0xcba, 0x5, 0x1}, {0x321, 0x3, 0x1000, 0xfb, 0x0, 0x8001}, {0x0, 0x7, 0x0, 0x6, 0x0, 0x7}, {0xff, 0x10000, 0x8, 0x6f, 0x8, 0x8}, {0x400, 0x1f, 0x4, 0x8, 0x9, 0x6}, {0x6, 0x1, 0x20, 0x7, 0x3, 0x2}, {0x1000, 0x200, 0xffff0000, 0x1, 0xcf, 0x8000}, {0xed, 0x0, 0x9, 0x4, 0x1f, 0x40}, {0x80000000, 0x1, 0x8, 0x0, 0x81, 0x71}, {0xfffffff7, 0x1000, 0x3, 0x0, 0x2, 0x80}, {0x4d46, 0xfffffffe, 0x5, 0x17, 0x6}, {0xfba, 0xc96, 0x5, 0x7fffffff, 0x100, 0xffffffe0}, {0x1, 0x7fffffff, 0x80, 0x7fffffff, 0x9, 0x2}, {0x1, 0x7, 0x8, 0x141, 0x9, 0x4}, {0x20, 0x9, 0x127836f7, 0xfffffffd, 0x1c620, 0x5}, {0x20, 0x7, 0x1, 0x1000, 0x2, 0x66}, {0x1, 0xd98f, 0xfff, 0x8, 0x80000001, 0x8}, {0x8, 0x6, 0x5, 0x6, 0x10000, 0x7}, {0x1f, 0x5, 0x7, 0x2, 0xe3, 0x2}, {0x3, 0xffff, 0x8, 0x1, 0x40, 0x1ff}, {0x6, 0x7b, 0x2, 0x6, 0xe1b, 0x6}, {0x5, 0xff, 0x6, 0x2, 0x6f44, 0x19}, {0xffffffff, 0x5, 0xac1, 0x7fff, 0x1, 0x3}, {0x6, 0x4bed, 0x7fffffff, 0x1, 0x6, 0xffffa229}, {0x7fffffff, 0x4b7, 0xb54, 0x2, 0x7fff, 0x8}, {0xffff, 0x20, 0x886, 0x0, 0xc3ba, 0x10001}, {0x2, 0x9e8, 0x0, 0xfffffff7, 0xffff, 0x4d}, {0x20, 0x8, 0x101, 0x0, 0x3, 0x84}, {0xcf, 0x200, 0x6, 0xa1b9, 0x3f, 0x7}, {0x800, 0x8, 0x7ff, 0x1, 0x2, 0x2}, {0x3f, 0x88000000, 0x101, 0x3, 0x0, 0x80000000}, {0x40, 0x5, 0x3ff, 0x4, 0x101, 0x40}, {0x1, 0x4, 0x1, 0x2, 0x6, 0x10000}, {0xffffffff, 0x4, 0x3, 0x5, 0x6}, {0x3, 0xffffffff, 0x3, 0xffff, 0x9, 0x7}, {0x4, 0x8, 0x9, 0x9, 0x80, 0xffff}, {0x70000000, 0x100, 0xfda2, 0x80000000, 0x6d, 0x7f}, {0xd8, 0x1, 0x15, 0x476ba14c, 0x4, 0x8}, {0x19ddebe3, 0x1, 0x0, 0x40, 0x6, 0xfb}], [{0x4}, {0x1, 0x1}, {0x3, 0x1}, {}, {0x4}, {0x3, 0x1}, {0x4}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x1}, {0x2}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {0x3}, {}, {0x1}, {0x2, 0xabbbff80861dbf2c}, {0x5, 0x1}, {0x5, 0x1}, {0x4}, {}, {0x5, 0x1}, {0x4}, {0x4, 0x1}, {0x5}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x2}, {0x2}, {0x2}, {}, {0x2, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x2, 0x99f56bb5aa3ca11b}, {0x2, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {}, {0x4, 0x1}, {0x4, 0x1}, {0xf5875189f9865e83}, {0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x4}, {0x5, 0x1}, {0x5}, {0x0, 0x1}, {0x3, 0x1}, {0x3}, {}, {0x3, 0x1}, {}, {0x4, 0x1}, {0x5}, {0x3}, {0x1}, {0x7}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x0, 0x1}, {0x5}, {0x2, 0x1}, {0x4}, {}, {0x3, 0x1}, {0x1}, {0x5, 0x1}, {0x4}, {0x5, 0x1}, {0x5}, {0x4}, {}, {0x7, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2}, {0x5}, {0x5}, {0x3, 0x1}, {0x4}, {0x0, 0x1}, {0x2}, {0x2}, {0x1}, {0x1, 0x1}, {0x3}, {0x1, 0x1}, {0x5}, {0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {}, {0x4, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5}, {}, {0x3}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x1}, {0x4}, {}, {0x3}, {0x5, 0x1}, {0x4}, {0x2, 0x2}, {0x4, 0x1}, {0x1, 0x1}], 0x1}}]}, {0xa3, 0x6, "2c742537b4793f1fa0266d206f528df96ea2683d40ed534b2f1519012624891683fcde6582d382ec40986760ea871e25d50a035cd854cf9953d047c48b7cba81ecc6dc9ebd641e1c727f23877d1c3fc9b2a8c79847f300a5a686c2ab306a703593ca7a89deb0fd1a510e534efff569fb832118b57425a76e8a4d7181a6035da6936ecfb293d45f4dfe47fb757e968078974c60f13093e9b55b91f4f26d1835"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_xt={0xdc, 0x12, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0x2}, @TCA_IPT_INDEX={0x8, 0x3, 0x9}]}, {0xa2, 0x6, "286c0afd5f76724227ddf67daa417b71327374769631849671b7cb6908aac57aa5925e0d676f8bc9b8855829131ff1a7e7323dbb0abf3d885afaeb7d18da71c1fc73484149ec7205c63a5957fe764fddaf95079215cb4883caa79aef05879b57a4f758729a8e3cfb6d7cd0e96f375772bd27ebc85d9770bee89593376180c694ba2d19081023fbdf9df75a17ee2eb7cd4554a4d05561ae0b286265835c82"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}]}, 0x5c50}, 0x1, 0x0, 0x0, 0x20000001}, 0x4048000) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:46 executing program 2: bpf$PROG_LOAD(0x19, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:46 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 13:29:46 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 13:29:47 executing program 1: bpf$PROG_LOAD(0x15, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:47 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000680)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1b96, 0x13, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 13:29:47 executing program 2: bpf$PROG_LOAD(0x1a, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:47 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) [ 421.849473][T13880] loop4: detected capacity change from 63 to 0 13:29:47 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) [ 421.982655][T13876] loop4: detected capacity change from 63 to 0 13:29:47 executing program 1: bpf$PROG_LOAD(0x16, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:47 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./control\x00') open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:47 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 13:29:47 executing program 2: bpf$PROG_LOAD(0x1b, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:47 executing program 1: bpf$PROG_LOAD(0x17, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:47 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) [ 422.432610][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? 13:29:47 executing program 2: bpf$PROG_LOAD(0x1c, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:47 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) [ 422.772437][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 422.781279][ T8939] usb usb4-port1: attempt power cycle [ 423.432349][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 423.748836][ T8939] usb usb4-port1: Cannot enable. Maybe the USB cable is bad? [ 423.765949][ T8939] usb usb4-port1: unable to enumerate USB device 13:29:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000004100)={0x0, 0x0, &(0x7f00000040c0)={0x0}}, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) 13:29:50 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x1) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:50 executing program 1: bpf$PROG_LOAD(0x18, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:50 executing program 2: bpf$PROG_LOAD(0x1d, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:50 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 13:29:50 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 13:29:50 executing program 2: bpf$PROG_LOAD(0x1e, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:50 executing program 1: bpf$PROG_LOAD(0x19, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:50 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x68) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) chdir(&(0x7f0000000040)='./control\x00') chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:50 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 13:29:50 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 13:29:50 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d00)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000c0, 0x0) 13:29:50 executing program 2: bpf$PROG_LOAD(0x21, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:50 executing program 1: bpf$PROG_LOAD(0x1a, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:50 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:'}, &(0x7f0000000140)={0x0, "c8c4c18ba7c97c5ee96b8597df0c24f62647a63274ab3d2985c053b58edd567e65340884e6abb3b194a71b2a4663d4a8668182d771f4422e9dec34a94b5d2af3"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:'}, &(0x7f0000000140)={0x0, "f3ec17e5708a04f901c82b2a2e2e6368575f46df12d715feacaf1d1e76772c5c0cf2f43bd889e6c2331d86c9cda8ec9a53c11cc817c8cb600e1ee7d3c67274af"}, 0x48, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, 0x0, 0x0) 13:29:50 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x3, {0xa, 0x0, 0x0, @mcast1}}}, 0x3a) 13:29:50 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x406) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x3, 0x1, 0x6, 0x2}, 0x10) socket(0x23, 0x800, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) rename(&(0x7f0000000080)='./control\x00', &(0x7f00000000c0)='./control/../file0\x00') 13:29:50 executing program 5: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'gretap0\x00', {0x2, 0x0, @private}}) socketpair(0xa, 0x0, 0xe5, &(0x7f0000000f00)) 13:29:50 executing program 2: bpf$PROG_LOAD(0x22, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:50 executing program 1: bpf$PROG_LOAD(0x1b, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:51 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000fc0)='ethtool\x00') syz_genetlink_get_family_id$l2tp(&(0x7f0000001c40)='l2tp\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001cc0)={0x0}, 0x10) 13:29:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000000)={0x0, {{0x2, 0x0, @dev}}, {{0x2, 0x0, @remote}}}, 0x108) 13:29:51 executing program 2: bpf$PROG_LOAD(0x23, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x16, 0x0, 0x1fc, 0xffffffff}, 0x40) 13:29:51 executing program 1: bpf$PROG_LOAD(0x1c, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:51 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) socket(0x8, 0x80001, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000380)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}, 0x0) 13:29:51 executing program 0: r0 = socket(0x11, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={0x0}}, 0x0) 13:29:51 executing program 2: bpf$PROG_LOAD(0xc0, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:51 executing program 1: bpf$PROG_LOAD(0x1d, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 13:29:51 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:51 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x6bd, &(0x7f0000000040)="2e4fd5fc", 0x4) 13:29:51 executing program 2: bpf$PROG_LOAD(0x7ffff, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:51 executing program 1: bpf$PROG_LOAD(0x1e, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:51 executing program 5: syz_genetlink_get_family_id$team(0xffffffffffffffff) 13:29:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x44041) 13:29:51 executing program 0: socketpair$unix(0x1, 0x866f5aec8e53bd3c, 0x0, 0x0) 13:29:51 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) socket(0x0, 0x800, 0x1) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 13:29:52 executing program 1: bpf$PROG_LOAD(0x21, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000e80)={@private1, @dev, @mcast1, 0x0, 0xeb}) 13:29:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000080)=""/196, &(0x7f0000000000)=0xc4) 13:29:52 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x11, &(0x7f00000005c0)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:52 executing program 1: bpf$PROG_LOAD(0x22, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:52 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x3, &(0x7f0000000240)=@framed={{0x3}}, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x8c, &(0x7f0000000380)=""/140, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000100)={@local, @loopback}, 0xc) 13:29:52 executing program 5: bpf$ITER_CREATE(0x16, 0x0, 0x0) 13:29:52 executing program 1: bpf$PROG_LOAD(0x23, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000080)=@hci, 0x8d, &(0x7f0000000280)=[{&(0x7f0000000100)=""/214, 0xd6}, {&(0x7f00000195c0)=""/100, 0x64}, {&(0x7f00000004c0)=""/102389, 0x18ff5}, {&(0x7f00000002c0)=""/183, 0xb7}], 0x4, &(0x7f00000194c0)=""/211, 0xd3}, 0x2101) 13:29:52 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000140)={0x4c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_FRAME={0x2e, 0x33, @probe_request={@wo_ht={{}, {}, @broadcast, @device_b}, @val={0x0, 0x6, @default_ibss_ssid}, @val, @void, @void, @val={0x72, 0x6}}}]}, 0x4c}}, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x200000000000011, 0x4000000000080002, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500803103000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000d94b352a0a2f80c06d5709ffc2c654"}, 0x46) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bind$packet(r4, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r4, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd2b, 0x0, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x8, 0x46}}}}}, 0x28}}, 0x4000) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="100029bd7000fedbdf251d00000008000300", @ANYRES32=r7, @ANYBLOB="0c1399001f000000150000000800010063000000"], 0x30}, 0x1, 0x0, 0x0, 0x408c005}, 0x840) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28008041", @ANYRES16=0x0, @ANYBLOB="020028bd7000fddbdf253100000008000300", @ANYRES32=r7, @ANYBLOB="0c0099000100000058000000"], 0x28}, 0x1, 0x0, 0x0, 0x810}, 0x84) sendmsg$NL80211_CMD_ABORT_SCAN(0xffffffffffffffff, &(0x7f0000006480)={&(0x7f00000063c0)={0x10, 0x0, 0x0, 0x10400000}, 0xc, &(0x7f0000006440)={&(0x7f0000006400)={0x1c, r2, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r7}, @void}}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8010}, 0x5) 13:29:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x5, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x8c, &(0x7f0000000380)=""/140, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$FOU_CMD_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 13:29:52 executing program 1: bpf$PROG_LOAD(0xc0, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x7], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 427.816184][T14064] ------------[ cut here ]------------ [ 427.822298][T14064] net/hsr/hsr_forward.c:533: Malformed frame (port_src hsr0) [ 427.858841][T14064] WARNING: CPU: 1 PID: 14064 at net/hsr/hsr_forward.c:532 hsr_forward_skb+0x1019/0x1770 [ 427.869386][T14064] Modules linked in: [ 427.873992][T14064] CPU: 1 PID: 14064 Comm: syz-executor.4 Not tainted 5.11.0-rc4-syzkaller #0 [ 427.883162][T14064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.893529][T14064] RIP: 0010:hsr_forward_skb+0x1019/0x1770 [ 427.899494][T14064] Code: f4 ff ff e8 59 82 c3 f8 4c 89 e1 ba 15 02 00 00 48 c7 c6 a0 1f 6d 8a 48 c7 c7 c0 20 6d 8a c6 05 87 49 40 04 01 e8 6b 74 0a 00 <0f> 0b 48 b8 00 00 00 00 00 fc ff df 4c 89 fa 48 c1 ea 03 80 3c 02 [ 427.919514][T14064] RSP: 0018:ffffc90001a275d0 EFLAGS: 00010282 [ 427.925966][T14064] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 427.934141][T14064] RDX: 0000000000040000 RSI: ffffffff815b6bf5 RDI: fffff52000344eac [ 427.942316][T14064] RBP: ffff888019ee7140 R08: 0000000000000000 R09: 0000000000000000 [ 427.950511][T14064] R10: ffffffff815afd9e R11: 0000000000000000 R12: ffff888076bc6000 [ 427.958687][T14064] R13: 1ffff92000344ec0 R14: ffff88802638f080 R15: ffff88802638f090 [ 427.966850][T14064] FS: 00007f3d1659f700(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000 [ 427.975994][T14064] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 427.982940][T14064] CR2: 000000000052e8cc CR3: 0000000014184000 CR4: 00000000001506e0 [ 427.991070][T14064] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 427.999334][T14064] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 428.007588][T14064] Call Trace: [ 428.011059][T14064] ? irqtime_account_irq+0x187/0x2d0 [ 428.016838][T14064] ? prp_fill_frame_info+0x6a0/0x6a0 [ 428.022433][T14064] ? lockdep_hardirqs_on+0x79/0x100 [ 428.028095][T14064] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 428.034590][T14064] ? __dev_direct_xmit+0x3f5/0x730 [ 428.040282][T14064] hsr_dev_xmit+0x78/0xd0 [ 428.044877][T14064] __dev_direct_xmit+0x527/0x730 [ 428.050057][T14064] ? validate_xmit_skb_list+0x120/0x120 13:29:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x5, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 13:29:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'team0\x00', {0x2, 0x0, @empty}}) 13:29:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x4, 0x0, 0x8}]}, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x8c, &(0x7f0000000380)=""/140, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 428.056017][T14064] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 428.062526][T14064] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 428.069105][T14064] ? netdev_pick_tx+0x150/0xb70 [ 428.074343][T14064] ? prb_fill_curr_block+0x5d0/0x5d0 [ 428.079866][T14064] packet_direct_xmit+0x1a5/0x280 [ 428.085283][T14064] packet_sendmsg+0x2413/0x52b0 [ 428.090511][T14064] ? __bpf_trace_sched_kthread_work_execute_end+0x21/0xe0 [ 428.098069][T14064] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 428.104622][T14064] ? sock_has_perm+0x1ee/0x280 [ 428.109904][T14064] ? selinux_socket_post_create+0x7c0/0x7c0 [ 428.116010][T14064] ? tomoyo_socket_sendmsg_permission+0xdc/0x340 [ 428.122709][T14064] ? sched_clock_cpu+0x18/0x1f0 [ 428.127862][T14064] ? tomoyo_socket_bind_permission+0x2f0/0x2f0 [ 428.134388][T14064] ? packet_cached_dev_get+0x250/0x250 [ 428.140411][T14064] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 428.147067][T14064] ? packet_cached_dev_get+0x250/0x250 [ 428.153161][T14064] sock_sendmsg+0xcf/0x120 [ 428.157964][T14064] ____sys_sendmsg+0x331/0x810 [ 428.163218][T14064] ? kernel_sendmsg+0x50/0x50 [ 428.168140][T14064] ? do_recvmmsg+0x6c0/0x6c0 [ 428.173099][T14064] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 428.179696][T14064] ? __lock_acquire+0x16c2/0x54f0 [ 428.185234][T14064] ___sys_sendmsg+0xf3/0x170 [ 428.190280][T14064] ? sendmsg_copy_msghdr+0x160/0x160 [ 428.195786][T14064] ? kvm_sched_clock_read+0x14/0x40 [ 428.201187][T14064] ? sched_clock+0x2a/0x40 [ 428.205799][T14064] ? sched_clock_cpu+0x18/0x1f0 13:29:53 executing program 1: bpf$PROG_LOAD(0x7ffff, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 428.210817][T14064] ? kvm_sched_clock_read+0x14/0x40 [ 428.216217][T14064] ? sched_clock+0x2a/0x40 [ 428.220778][T14064] ? sched_clock_cpu+0x18/0x1f0 [ 428.226317][T14064] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 428.233048][T14064] ? lockdep_hardirqs_on+0x79/0x100 [ 428.239245][T14064] __sys_sendmmsg+0x195/0x470 [ 428.244521][T14064] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 428.250094][T14064] ? sched_clock+0x2b/0x40 [ 428.254978][T14064] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 13:29:53 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x4, 0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x30) [ 428.261722][T14064] ? lockdep_hardirqs_on+0x79/0x100 [ 428.267168][T14064] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 428.273910][T14064] ? trace_hardirqs_on+0x38/0x1c0 [ 428.279909][T14064] __x64_sys_sendmmsg+0x99/0x100 [ 428.285125][T14064] do_syscall_64+0x2d/0x70 [ 428.289831][T14064] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 428.296013][T14064] RIP: 0033:0x45e219 [ 428.300166][T14064] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.320237][T14064] RSP: 002b:00007f3d1659ec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 428.329400][T14064] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 428.337715][T14064] RDX: 000000000400004e RSI: 0000000020000d00 RDI: 0000000000000006 [ 428.345891][T14064] RBP: 000000000119bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 428.354100][T14064] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 428.362276][T14064] R13: 00007ffdb48402bf R14: 00007f3d1659f9c0 R15: 000000000119bf8c [ 428.370722][T14064] Kernel panic - not syncing: panic_on_warn set ... [ 428.377342][T14064] CPU: 1 PID: 14064 Comm: syz-executor.4 Not tainted 5.11.0-rc4-syzkaller #0 [ 428.386340][T14064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.396457][T14064] Call Trace: [ 428.399841][T14064] dump_stack+0x107/0x163 [ 428.404331][T14064] panic+0x306/0x73d [ 428.408300][T14064] ? __warn_printk+0xf3/0xf3 [ 428.412941][T14064] ? __warn.cold+0x1a/0x44 [ 428.417416][T14064] ? hsr_forward_skb+0x1019/0x1770 [ 428.422597][T14064] __warn.cold+0x35/0x44 [ 428.426905][T14064] ? hsr_forward_skb+0x1019/0x1770 [ 428.433395][T14064] report_bug+0x1bd/0x210 [ 428.437783][T14064] handle_bug+0x3c/0x60 [ 428.442009][T14064] exc_invalid_op+0x14/0x40 [ 428.446575][T14064] asm_exc_invalid_op+0x12/0x20 [ 428.451468][T14064] RIP: 0010:hsr_forward_skb+0x1019/0x1770 [ 428.458146][T14064] Code: f4 ff ff e8 59 82 c3 f8 4c 89 e1 ba 15 02 00 00 48 c7 c6 a0 1f 6d 8a 48 c7 c7 c0 20 6d 8a c6 05 87 49 40 04 01 e8 6b 74 0a 00 <0f> 0b 48 b8 00 00 00 00 00 fc ff df 4c 89 fa 48 c1 ea 03 80 3c 02 [ 428.477908][T14064] RSP: 0018:ffffc90001a275d0 EFLAGS: 00010282 [ 428.484017][T14064] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 428.492028][T14064] RDX: 0000000000040000 RSI: ffffffff815b6bf5 RDI: fffff52000344eac [ 428.500039][T14064] RBP: ffff888019ee7140 R08: 0000000000000000 R09: 0000000000000000 [ 428.508144][T14064] R10: ffffffff815afd9e R11: 0000000000000000 R12: ffff888076bc6000 [ 428.516289][T14064] R13: 1ffff92000344ec0 R14: ffff88802638f080 R15: ffff88802638f090 [ 428.524489][T14064] ? wake_up_klogd.part.0+0x8e/0xd0 [ 428.530187][T14064] ? vprintk_func+0x95/0x1e0 [ 428.534896][T14064] ? irqtime_account_irq+0x187/0x2d0 [ 428.540585][T14064] ? prp_fill_frame_info+0x6a0/0x6a0 [ 428.546155][T14064] ? lockdep_hardirqs_on+0x79/0x100 [ 428.551459][T14064] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 428.557677][T14064] ? __dev_direct_xmit+0x3f5/0x730 [ 428.562833][T14064] hsr_dev_xmit+0x78/0xd0 [ 428.567235][T14064] __dev_direct_xmit+0x527/0x730 [ 428.572220][T14064] ? validate_xmit_skb_list+0x120/0x120 [ 428.577830][T14064] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 428.584131][T14064] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 428.590443][T14064] ? netdev_pick_tx+0x150/0xb70 [ 428.595355][T14064] ? prb_fill_curr_block+0x5d0/0x5d0 [ 428.600770][T14064] packet_direct_xmit+0x1a5/0x280 [ 428.606245][T14064] packet_sendmsg+0x2413/0x52b0 [ 428.611167][T14064] ? __bpf_trace_sched_kthread_work_execute_end+0x21/0xe0 [ 428.618336][T14064] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 428.624649][T14064] ? sock_has_perm+0x1ee/0x280 [ 428.630886][T14064] ? selinux_socket_post_create+0x7c0/0x7c0 [ 428.637058][T14064] ? tomoyo_socket_sendmsg_permission+0xdc/0x340 [ 428.643575][T14064] ? sched_clock_cpu+0x18/0x1f0 [ 428.648479][T14064] ? tomoyo_socket_bind_permission+0x2f0/0x2f0 [ 428.654713][T14064] ? packet_cached_dev_get+0x250/0x250 [ 428.660270][T14064] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 428.666921][T14064] ? packet_cached_dev_get+0x250/0x250 [ 428.672446][T14064] sock_sendmsg+0xcf/0x120 [ 428.676979][T14064] ____sys_sendmsg+0x331/0x810 [ 428.682075][T14064] ? kernel_sendmsg+0x50/0x50 [ 428.686891][T14064] ? do_recvmmsg+0x6c0/0x6c0 [ 428.691714][T14064] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 428.698007][T14064] ? __lock_acquire+0x16c2/0x54f0 [ 428.703460][T14064] ___sys_sendmsg+0xf3/0x170 [ 428.708121][T14064] ? sendmsg_copy_msghdr+0x160/0x160 [ 428.713641][T14064] ? kvm_sched_clock_read+0x14/0x40 [ 428.718929][T14064] ? sched_clock+0x2a/0x40 [ 428.724317][T14064] ? sched_clock_cpu+0x18/0x1f0 [ 428.729274][T14064] ? kvm_sched_clock_read+0x14/0x40 [ 428.735083][T14064] ? sched_clock+0x2a/0x40 [ 428.739615][T14064] ? sched_clock_cpu+0x18/0x1f0 [ 428.744887][T14064] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 428.751135][T14064] ? lockdep_hardirqs_on+0x79/0x100 [ 428.756478][T14064] __sys_sendmmsg+0x195/0x470 [ 428.761295][T14064] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 428.766419][T14064] ? sched_clock+0x2b/0x40 [ 428.770944][T14064] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 428.777191][T14064] ? lockdep_hardirqs_on+0x79/0x100 [ 428.782662][T14064] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 428.788946][T14064] ? trace_hardirqs_on+0x38/0x1c0 [ 428.794198][T14064] __x64_sys_sendmmsg+0x99/0x100 [ 428.799250][T14064] do_syscall_64+0x2d/0x70 [ 428.803748][T14064] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 428.809783][T14064] RIP: 0033:0x45e219 [ 428.813824][T14064] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.833484][T14064] RSP: 002b:00007f3d1659ec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 428.842042][T14064] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 428.850175][T14064] RDX: 000000000400004e RSI: 0000000020000d00 RDI: 0000000000000006 [ 428.858408][T14064] RBP: 000000000119bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 428.866498][T14064] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 428.874532][T14064] R13: 00007ffdb48402bf R14: 00007f3d1659f9c0 R15: 000000000119bf8c [ 428.883877][T14064] Kernel Offset: disabled [ 428.888579][T14064] Rebooting in 86400 seconds..