[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.583970][ T26] audit: type=1800 audit(1556685133.626:25): pid=7933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 41.618438][ T26] audit: type=1800 audit(1556685133.626:26): pid=7933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 41.647067][ T26] audit: type=1800 audit(1556685133.636:27): pid=7933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.218' (ECDSA) to the list of known hosts. 2019/05/01 04:32:25 fuzzer started 2019/05/01 04:32:28 dialing manager at 10.128.0.26:34869 2019/05/01 04:32:28 syscalls: 2440 2019/05/01 04:32:28 code coverage: enabled 2019/05/01 04:32:28 comparison tracing: enabled 2019/05/01 04:32:28 extra coverage: extra coverage is not supported by the kernel 2019/05/01 04:32:28 setuid sandbox: enabled 2019/05/01 04:32:28 namespace sandbox: enabled 2019/05/01 04:32:28 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 04:32:28 fault injection: enabled 2019/05/01 04:32:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 04:32:28 net packet injection: enabled 2019/05/01 04:32:28 net device setup: enabled 04:34:11 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) syzkaller login: [ 159.195074][ T8097] IPVS: ftp: loaded support on port[0] = 21 04:34:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x100000000014, 0x4, 0x4, 0x39e1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000100), 0x0, 0x3}, 0x20) [ 159.311207][ T8097] chnl_net:caif_netlink_parms(): no params data found [ 159.390387][ T8097] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.397953][ T8097] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.420624][ T8097] device bridge_slave_0 entered promiscuous mode [ 159.440226][ T8097] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.447494][ T8097] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.470041][ T8097] device bridge_slave_1 entered promiscuous mode [ 159.494339][ T8100] IPVS: ftp: loaded support on port[0] = 21 [ 159.527214][ T8097] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.543827][ T8097] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 159.583213][ T8097] team0: Port device team_slave_0 added 04:34:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xfffffffffffffe84) close(r0) accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) [ 159.595565][ T8097] team0: Port device team_slave_1 added [ 159.661904][ T8097] device hsr_slave_0 entered promiscuous mode [ 159.718703][ T8097] device hsr_slave_1 entered promiscuous mode 04:34:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) [ 159.806562][ T8102] IPVS: ftp: loaded support on port[0] = 21 [ 159.856495][ T8097] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.863988][ T8097] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.871872][ T8097] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.879017][ T8097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.990079][ T8100] chnl_net:caif_netlink_parms(): no params data found [ 160.077479][ T8105] IPVS: ftp: loaded support on port[0] = 21 [ 160.090205][ T8100] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.097319][ T8100] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.111358][ T8100] device bridge_slave_0 entered promiscuous mode 04:34:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x200000, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000080)=r2) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000140)={0x3, 0x2, 0x0, [{0x40, 0x8, 0xfffffffffffffffb, 0xf2e9, 0x4, 0xfff, 0xfff}, {0x5, 0x6, 0x80000001, 0x2, 0x1, 0x9, 0x76}]}) readv(r1, &(0x7f0000000240)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1) [ 160.142458][ T8097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.155640][ T8100] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.164277][ T8100] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.173808][ T8100] device bridge_slave_1 entered promiscuous mode [ 160.196195][ T8097] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.206735][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.220437][ T8106] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.249603][ T8106] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.270267][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 160.356405][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.370874][ T8106] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.377985][ T8106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.390112][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 04:34:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000340)={0x0, 0x400000000000263, 0x0, 0x0, &(0x7f00000000c0)=[{}]}) [ 160.400031][ T8106] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.407195][ T8106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.461413][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.469350][ T8109] IPVS: ftp: loaded support on port[0] = 21 [ 160.480086][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 160.491508][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.501424][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.512359][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.521162][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.531523][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 160.540484][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 160.552579][ T8100] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 160.597881][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 160.606093][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.617025][ T8100] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 160.644164][ T8102] chnl_net:caif_netlink_parms(): no params data found [ 160.675902][ T8111] IPVS: ftp: loaded support on port[0] = 21 [ 160.685764][ T8097] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 160.704332][ T8100] team0: Port device team_slave_0 added [ 160.743800][ T8100] team0: Port device team_slave_1 added [ 160.807569][ T8102] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.817574][ T8102] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.825482][ T8102] device bridge_slave_0 entered promiscuous mode [ 160.881435][ T8100] device hsr_slave_0 entered promiscuous mode [ 160.898576][ T8100] device hsr_slave_1 entered promiscuous mode [ 160.974421][ T8102] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.982430][ T8102] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.990643][ T8102] device bridge_slave_1 entered promiscuous mode [ 161.054301][ T8102] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 161.084354][ T8102] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 161.096887][ T8105] chnl_net:caif_netlink_parms(): no params data found 04:34:13 executing program 0: 04:34:13 executing program 0: 04:34:13 executing program 0: 04:34:13 executing program 0: [ 161.325512][ T8102] team0: Port device team_slave_0 added 04:34:13 executing program 0: 04:34:13 executing program 0: [ 161.399878][ T8105] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.407091][ T8105] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.429745][ T8105] device bridge_slave_0 entered promiscuous mode [ 161.437744][ T8105] bridge0: port 2(bridge_slave_1) entered blocking state 04:34:13 executing program 0: [ 161.446601][ T8105] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.460607][ T8105] device bridge_slave_1 entered promiscuous mode [ 161.479671][ T8102] team0: Port device team_slave_1 added [ 161.512512][ T8109] chnl_net:caif_netlink_parms(): no params data found [ 161.522575][ T8111] chnl_net:caif_netlink_parms(): no params data found [ 161.550919][ T8105] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 161.586544][ T8105] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 161.640173][ T8102] device hsr_slave_0 entered promiscuous mode [ 161.679440][ T8102] device hsr_slave_1 entered promiscuous mode [ 161.765587][ T8105] team0: Port device team_slave_0 added [ 161.792306][ T8109] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.799683][ T8109] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.807572][ T8109] device bridge_slave_0 entered promiscuous mode [ 161.830851][ T8105] team0: Port device team_slave_1 added [ 161.836831][ T8111] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.844199][ T8111] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.852526][ T8111] device bridge_slave_0 entered promiscuous mode [ 161.861778][ T8109] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.869995][ T8109] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.877730][ T8109] device bridge_slave_1 entered promiscuous mode [ 161.894491][ T8111] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.902059][ T8111] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.910437][ T8111] device bridge_slave_1 entered promiscuous mode [ 161.923267][ T8100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.969933][ T8109] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 162.021976][ T8105] device hsr_slave_0 entered promiscuous mode [ 162.058684][ T8105] device hsr_slave_1 entered promiscuous mode [ 162.100930][ T8111] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 162.116647][ T8100] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.126629][ T8109] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 162.154321][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.162701][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.172254][ T8111] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 162.215083][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.225128][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.234224][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.241393][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.263490][ T8109] team0: Port device team_slave_0 added [ 162.271363][ T8109] team0: Port device team_slave_1 added [ 162.294464][ T8111] team0: Port device team_slave_0 added [ 162.303960][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.312841][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.321595][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.330367][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.337438][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.366010][ T8111] team0: Port device team_slave_1 added [ 162.374113][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.431437][ T8109] device hsr_slave_0 entered promiscuous mode [ 162.488784][ T8109] device hsr_slave_1 entered promiscuous mode [ 162.569712][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.579539][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.588729][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.597368][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.671169][ T8111] device hsr_slave_0 entered promiscuous mode [ 162.721350][ T8111] device hsr_slave_1 entered promiscuous mode [ 162.768551][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.777270][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.785949][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.794303][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.812460][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.820889][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.841152][ T8100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.863707][ T8102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.879439][ T8105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.901357][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.909224][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.922444][ T8100] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.938619][ T8105] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.972603][ T8102] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.981518][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.989552][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.016655][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.027342][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.036235][ T2823] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.043384][ T2823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.052755][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.061953][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.070490][ T2823] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.077560][ T2823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.085458][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.094474][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.116459][ T8109] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.130093][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.138786][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.147169][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.154329][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.164147][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.172843][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.181331][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.188537][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.196231][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.205150][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.263617][ T8109] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.276086][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.289602][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.304163][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 04:34:15 executing program 1: [ 163.315825][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.325694][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.336289][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.355892][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.364974][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.373629][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.383004][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.392446][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.400768][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.433944][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.444069][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.453525][ T8106] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.460696][ T8106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.471756][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.480351][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.488803][ T8106] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.495930][ T8106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.503654][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.512268][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.521002][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.530144][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.538724][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.547019][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.556232][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.575006][ T8102] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 163.600683][ T8105] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 163.614050][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.623955][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.633766][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.642471][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.651247][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.660024][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.669005][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.677507][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.686431][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.714495][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.723752][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.752791][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.762907][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.772025][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.781154][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.791651][ T8105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.808931][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.824671][ T8111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.834121][ T8102] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.860666][ T8109] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.874528][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.895537][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.917672][ T8111] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.933613][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.943523][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.953051][ T8106] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.960177][ T8106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.986844][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.999302][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.007966][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.026685][ T8106] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.033882][ T8106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.043976][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.078781][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.087621][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.101231][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.111014][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.136634][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.146338][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.157517][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.166391][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.187477][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.196437][ T3538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.231457][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.272880][ T8111] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.330950][ C0] hrtimer: interrupt took 27357 ns [ 164.385001][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:34:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xfffffffffffffe84) close(r0) accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 04:34:16 executing program 0: [ 164.590502][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:34:17 executing program 4: 04:34:17 executing program 1: 04:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000340)={0x0, 0x400000000000263, 0x0, 0x0, &(0x7f00000000c0)=[{}]}) 04:34:17 executing program 0: 04:34:17 executing program 2: 04:34:17 executing program 2: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 04:34:17 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(r0, 0x0, 0x0) 04:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc9, 0x2, 0x5}) r1 = gettid() exit_group(0x0) ptrace(0x4206, r1) wait4(0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x800, 0x0) 04:34:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4008550c, 0x0) 04:34:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) accept4$inet6(r0, 0x0, &(0x7f0000000200), 0x800) 04:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) [ 165.373185][ T8211] vhci_hcd: default hub control req: 1909 v0000 i0000 l0 04:34:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000001980)="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", 0x4c9, r0) keyctl$read(0xb, r1, &(0x7f0000005340)=""/4096, 0xd900) 04:34:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000340), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000140), 0x10) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 04:34:17 executing program 4: syz_execute_func(&(0x7f0000000600)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e3c463dd691d4c000000c4c442019dcc6f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x20000000103e, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) 04:34:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000340), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000500)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000140), 0x10) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 04:34:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) epoll_create1(0x0) write(r1, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406", 0x91) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000800)) sendfile(r1, r1, &(0x7f0000000080), 0x7ffffffb) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000b00)=0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$team(0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x8000) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000100), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) 04:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:18 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x73, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0) write$binfmt_elf64(r0, &(0x7f0000001140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000003e00000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e818f9b1b47aa49200000000000000000000000000000000000000000000000000000000e2ffffff00"/694], 0x2b6) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0x4, 0x4) sendto$inet(r0, &(0x7f0000001600)="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", 0x36f, 0x80ff, 0x0, 0x0) 04:34:18 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") clone(0x3fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20022, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) creat(0x0, 0x0) 04:34:18 executing program 2: 04:34:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:18 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@polexpire={0xc0, 0x1b, 0x31, 0x0, 0x0, {{{@in=@dev, @in6=@local}}}}, 0xc0}}, 0x0) 04:34:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = gettid() exit_group(0x0) ptrace(0x4206, r0) wait4(0x0, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, 0x0) 04:34:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123d319bd070") r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x77622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0xffffffffffffffa7, 0x800020, &(0x7f0000009000)}) 04:34:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/129, 0x81) [ 166.433231][ T8295] binder: 8294:8295 transaction failed 29189/-22, size 40-8 line 2995 04:34:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 04:34:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/129, 0x81) 04:34:18 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) 04:34:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) 04:34:18 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:18 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/129, 0x81) 04:34:19 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 04:34:19 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:19 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:19 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 04:34:19 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 04:34:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xe, &(0x7f00000008c0)=""/241, &(0x7f00000009c0)=0xf1) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000240)) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000013c0)=""/246) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:19 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:19 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:19 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:19 executing program 1: 04:34:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:19 executing program 5: 04:34:19 executing program 1: 04:34:19 executing program 2: ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:19 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:19 executing program 0: 04:34:19 executing program 1: 04:34:19 executing program 2: ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:19 executing program 5: 04:34:19 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:20 executing program 1: 04:34:20 executing program 5: 04:34:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:20 executing program 2: ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:20 executing program 0: 04:34:20 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:20 executing program 5: 04:34:20 executing program 2: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:20 executing program 0: 04:34:20 executing program 1: 04:34:20 executing program 5: 04:34:20 executing program 4: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:20 executing program 2: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:20 executing program 1: 04:34:20 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r0, &(0x7f00000000c0)=""/129, 0x81) 04:34:20 executing program 0: 04:34:20 executing program 5: 04:34:20 executing program 1: 04:34:20 executing program 2: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:20 executing program 0: 04:34:20 executing program 4: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:20 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r0, &(0x7f00000000c0)=""/129, 0x81) 04:34:20 executing program 5: 04:34:20 executing program 1: 04:34:20 executing program 0: 04:34:20 executing program 1: 04:34:20 executing program 2: syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:20 executing program 5: 04:34:20 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r0, &(0x7f00000000c0)=""/129, 0x81) 04:34:20 executing program 4: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:20 executing program 0: 04:34:20 executing program 2: syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:21 executing program 5: 04:34:21 executing program 1: 04:34:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:21 executing program 4: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:21 executing program 0: 04:34:21 executing program 5: 04:34:21 executing program 2: syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000000)={{}, 0x1}) 04:34:21 executing program 1: 04:34:21 executing program 4: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:21 executing program 0: 04:34:21 executing program 5: 04:34:21 executing program 4: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:21 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, 0x0) 04:34:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:21 executing program 1: 04:34:21 executing program 0: 04:34:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:21 executing program 5: 04:34:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:21 executing program 1: 04:34:21 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, 0x0) 04:34:21 executing program 5: 04:34:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:21 executing program 0: 04:34:21 executing program 5: 04:34:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:21 executing program 1: 04:34:21 executing program 0: 04:34:21 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, 0x0) 04:34:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:21 executing program 5: 04:34:22 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:22 executing program 0: 04:34:22 executing program 1: 04:34:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:22 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)) 04:34:22 executing program 5: 04:34:22 executing program 1: 04:34:22 executing program 0: 04:34:22 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:22 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)) 04:34:22 executing program 5: 04:34:22 executing program 1: 04:34:22 executing program 0: 04:34:22 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:22 executing program 5: 04:34:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:22 executing program 1: 04:34:22 executing program 0: 04:34:22 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)) 04:34:22 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:22 executing program 5: 04:34:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:22 executing program 1: 04:34:22 executing program 0: 04:34:22 executing program 2: 04:34:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:22 executing program 5: 04:34:22 executing program 1: 04:34:22 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:22 executing program 0: 04:34:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:22 executing program 5: 04:34:22 executing program 2: 04:34:23 executing program 1: 04:34:23 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:23 executing program 0: 04:34:23 executing program 5: 04:34:23 executing program 1: 04:34:23 executing program 2: 04:34:23 executing program 0: 04:34:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:23 executing program 5: 04:34:23 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:23 executing program 1: 04:34:23 executing program 0: 04:34:23 executing program 2: 04:34:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:23 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:23 executing program 5: 04:34:23 executing program 1: 04:34:23 executing program 0: 04:34:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:23 executing program 2: 04:34:23 executing program 0: 04:34:23 executing program 1: 04:34:23 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:23 executing program 5: 04:34:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:23 executing program 1: 04:34:23 executing program 0: 04:34:23 executing program 5: 04:34:23 executing program 2: 04:34:23 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:23 executing program 1: 04:34:23 executing program 2: 04:34:23 executing program 5: 04:34:23 executing program 0: 04:34:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:24 executing program 2: 04:34:24 executing program 5: 04:34:24 executing program 1: 04:34:24 executing program 0: 04:34:24 executing program 2: 04:34:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:24 executing program 1: 04:34:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:24 executing program 5: 04:34:24 executing program 2: 04:34:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:24 executing program 1: 04:34:24 executing program 5: 04:34:24 executing program 0: 04:34:24 executing program 2: 04:34:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:24 executing program 5: 04:34:24 executing program 1: 04:34:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:24 executing program 2: 04:34:24 executing program 0: 04:34:24 executing program 5: 04:34:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:24 executing program 2: 04:34:24 executing program 1: 04:34:24 executing program 5: 04:34:24 executing program 0: 04:34:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:24 executing program 1: 04:34:24 executing program 2: 04:34:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:25 executing program 5: 04:34:25 executing program 0: 04:34:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:25 executing program 1: 04:34:25 executing program 2: 04:34:25 executing program 5: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000080)) 04:34:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7e) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 04:34:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000261, 0x0) 04:34:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) 04:34:25 executing program 5: r0 = syz_open_dev$sndmidi(&(0x7f0000001880)='/dev/snd/midiC#D#\x00', 0x2, 0x0) readv(r0, &(0x7f0000001780)=[{&(0x7f00000001c0)=""/206, 0x1f0}], 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r1) 04:34:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:25 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/tcp6\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2b, 0x0) 04:34:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, 0x0) [ 173.547148][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 173.547169][ T26] audit: type=1804 audit(1556685265.586:31): pid=8854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir081086852/syzkaller.fOuUHi/43/memory.events" dev="sda1" ino=16607 res=1 04:34:25 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/tcp6\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2b, 0x0) 04:34:25 executing program 1: 04:34:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) [ 173.734220][ T26] audit: type=1800 audit(1556685265.586:32): pid=8854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16607 res=0 04:34:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, 0x0) [ 173.853940][ T26] audit: type=1800 audit(1556685265.626:33): pid=8851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16607 res=0 04:34:26 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) creat(&(0x7f0000000000)='./file1\x00', 0x11) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 04:34:26 executing program 1: 04:34:26 executing program 5: syz_execute_func(&(0x7f0000000200)="410f01f964ff0941c3c4837961fb672636f3450faec63e46d87312c4c209bab7440000003e0f1110c442019dcc6f") clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x6de49df937ed9a54) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000140)) 04:34:26 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/tcp6\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2b, 0x0) 04:34:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, 0x0) 04:34:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/et\x00\x03\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:34:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:26 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2b, 0x0) 04:34:26 executing program 1: 04:34:26 executing program 5: 04:34:26 executing program 2: 04:34:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a9061", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:26 executing program 1: 04:34:26 executing program 0: 04:34:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a9061", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:26 executing program 5: 04:34:26 executing program 2: syz_execute_func(&(0x7f0000000480)="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") syz_execute_func(&(0x7f0000000200)="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") 04:34:26 executing program 0: clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000d40)="c4e379614832074a2be993980f0536410f57f0c4a37bf0c50141e2e966d995f214fc25400640062ff2f3b60f449c38463dc402a1ad7d6af0410fbaaf7f000000bbc482514654fa00c4e2859ecf327149f080a600000000c8702e175fc2e54c0a8f8858ee93f042fe8d0e8000000000c442319ebb70fe6581f0430fc0b25bf34cb4c46178510bbac91c5852c4e10efde600008cb116c482e59b7509f0809f39a72dc89d26669f0fdf53e9e244c05c7e7e84dc849b5687660f383c94a33ca000003e660f6eb45bf043861680417cd866420f383bd4643619ec000046d01496da6afc400f38253d03000000662e660f38f65a03c4c2801d9c96c9e8e9362665eb468fc920011a818194d8000f092ddd8f0b00c4a17ae6ad91007b1cc48178ae9bd49e25f8362e362eba36646466264683b9080000000d0df8c5429565b1fafaa3394964ffe7d0c4646666460f1052020f6baf00c4e3990f1d56076566440fe5d58374fb0a07c423a97910b4d5a8edf20f1dbe001000008fe858a3130a8f659780479100c4a269ac150a000000c4834d6b830b00000041c4a37d494cd00333460fedbcf6ade2000083439b685c2626f343d813f3450f525c390e42a7c4a2a9b73a80200e0f4401c44134269fd5f3450f1231c4a27508313bec") shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffa000/0x4000)=nil) bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) r0 = inotify_init() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc00123c12") r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000100)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000180)={r3, r4}) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r5, 0x0, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r6) tkill(0x0, 0x1c) 04:34:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:26 executing program 1: syz_execute_func(&(0x7f0000000840)="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") 04:34:26 executing program 5: syz_execute_func(&(0x7f0000000040)="c4e379614832074a2be993980f0536410f57f0c4a37bf0c50141e2e966d995f214fc25400640062ff2f3b60f449c38463dc402a1ad7d6af0410fbaaf7f000000bbc482514654fa00c4e2859ecf327149f080a600000000c8702e2a5fc2e54c0a8f8858ee93f042fe8d0e8000000000c442319ebb70fe6581f0430fc0b25bf34cb4c46178510bbac91c5852c4e10efde600003c059b7509f0809f39a72dc89d26669f0fdf53e9e244c05c7e7e84dc849b5687660f383c94a33ca000003e660f6eb45bf043861680417cd866420f383bd4643619ec000046d01496da6afc400f38253d03000000662e660f38f65a03c4c2801d9c96c9e8e9362665eb468fc920011a818194d8000f092ddd8f0b00c4a103e6ad91007b1cc48178ae9bd49e25f8362e362eba36646466264683b9080000000d0df8c5429565b1fafaa3394964ffe7d0c4646666460f1052020f6baf00c4e3990f1d56076566440fe5d58374fb0a07c423a97910b4d5a8edf20f1dbe001000008fe858a3130a8f41dd7c028380479100c4a269ac150a000000c4834d6b830b00000041c4a37d494cd00333460fedbcf6ade2000083439b685c2626f343d813f3450f525c390e42c19ea79ea7a9b73a80200ec42205a9e1c44134269fd5f3450f1231c4a27508313bec") 04:34:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a9061", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:27 executing program 1: clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000d40)="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") shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffa000/0x4000)=nil) bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000100)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000180)={r2, r3}) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r4, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 04:34:27 executing program 5: syz_execute_func(&(0x7f0000000200)="c4e379614832074a2be91c39980f05f7a6aae28920aec4a37bf0c50141e2e922ebc4a2fd1ceb262f4bca0612f3262e360f0d043891cd36cd36c421fa6f3d136c000000f2d2dec461dc57b1e67d0b25c4837916d2befac402f18e6820e9e9491e2f160f6cf141fefebec5c54d0f2c718f56676beeeec422c1afcc9df8f86dc483057f6e3e5340b267f34cb4bac4a31149a0070000002499fa6c470f01fced6c1feda827c4a2a9095351c48255973bc4c19dfb96f88e00000f3a16288836670fe0a9f27f00009ad6910404660f383ca3300a0000efef768b8b8b27c4a2798149d9262626e1d8463307383baa642667f3d96e0367460f3300028f6a78106f65030000004074d266413a010fc442fd21b19b0b0000f2f1a1c9000000001adddd411171f200594fc4a1ff1182424ca28cdc62c9ae49f1a79ad08181942400092ddd8f0b00c4a17ae64295007bf208f522ba22baa9a700002e3264074636cc4683b9080000000dc4e27d0ed2800036b2aad9c7673666430f5141ae78474c593e40d9f50f001e570000a858ed43fbc42119da3cb01100430f12a2d08212d4e51cc40521f95a6617cc4cf9f240150f9e8b790000000021f15a0cdac421fd29fa002d08000000009b5d8ea7a7282856f79c497057573e460f19690dc4027d5a2fc4c1cdc28a000000000042da9a348d1755c4a2750831c44109f89700008020") 04:34:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:27 executing program 0: syz_execute_func(&(0x7f0000000040)="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") syz_execute_func(&(0x7f0000000600)="c4e37961483207422be91cb9980f053ef3aec4a37bf0c50041e2e92e77e226462a250fd40c999a0799000078a3909a909a00262fed80660f38463da1637963790600000f4eda2666450f65e0c461dc57b1e67d0b25bc9551fa0040dbe1c443755c0a0e0f41fe0f3801bd050000004cbec5c54d0f2c718f56676beeee8f5670b63b30319ebb70fe6581f0430f40b2c46159f5b76d22720af281f999899999a8270f0147004798f2ae66410f3aaf288842f70f39fd48fd48df536bd1148e8e99e1430faec4a27929f97cd8edf7d8a1a12ad764c4643a5f4066bd0ffe383bd4d467460f330002f44064d266413a010f0f30ca30cac4627d1df1ef00ddeac4c2801d9c96c9e8e9362e36f2a796d0818194d800092ddd8f0b00c4a17ae64295007b1cffd2c422b59aa9a7a400002e36646466264683b9080000000d5df698b90000002e440fdd0636b2aad9c741af0fd97b8bc104c0414c598374fb0a070f001e66400fe3d357000026dbe3edc4037d092101f20f1dbe0010000000e5c565970d22045c0b07d56e474cf92f5c65c4002d08000000009b42a7a728f356564401a9bb40cb4245dbd7c4a2fd2a953ce700004974ecd53131fbc4a2750831c44109f89700008020") 04:34:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 175.200896][ T8976] mmap: syz-executor.5 (8976) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 175.269784][ T8988] warning: process `syz-executor.5' used the deprecated sysctl system call with [ 175.345635][ T8988] syz-executor.5 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 04:34:27 executing program 2: inotify_init() socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:34:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:27 executing program 1: inotify_init1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl(r0, 0x20001000008912, &(0x7f0000000000)="0adc1f123c123f339bd070") syz_execute_func(&(0x7f0000000000)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ffc44209a7b700000000c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 04:34:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 04:34:27 executing program 0: syz_execute_func(&(0x7f00000005c0)="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") syz_execute_func(&(0x7f0000000640)="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") 04:34:27 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000840)="c4e379614832074a2be993980f0536410f57f0c4a37bf0c50141e2e966d995f214fc25400640062ff2f3b60f449c38463dc402a1ad7d6af0410fbaaf7f000000bbc482514654fa00c4e2859ecf327149f080a600000000c8702e175fc2e54c0a8f8858ee93f042fe8d0e8000000000c442319ebb70fe6581f0430fc0b25bf34cb4c46178510bbac91c5852c4e10efde600008cb116c482e59b7509f0809f39a72dc89d26669f0fdf53e9e244c05c7e7e84dc849b5687660f383c94a33ca000003e660f6eb45bf043861680417cd866420f383bd4643619ec000046d01496da6afc400f38253d03000000662e660f38f65a03c4c2801d9c96c9e8e9362665eb468fc920011a818194d8000f092ddd8f0b00c4a17ae6ad91007b1cc48178ae9bd49e25f8362e362eba36646466264683b9080000000d0df8c5429565b1fafaa3394964ffe7d0c4646666460f1052020f6baf00c4e3990f1d56076566440fe5d58374fb0a07c423a97910b4d5a8edf20f1dbe001000008fe858a3130a8f41dd7c028380479100c4a269ac150a000000c4834d6b830b00000041c4a37d494cd00333460fedbcf6ade2000083439b685c2626f343d813f3450f525c390e42c19ea79ea7a9b73a80200ec42205a9e1c44134269fd5f3450f1231c4a27508313bec") 04:34:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:27 executing program 4: syz_execute_func(&(0x7f0000000080)="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") syz_execute_func(&(0x7f0000000900)="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") 04:34:27 executing program 1: inotify_init1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl(r0, 0x20001000008912, &(0x7f0000000000)="0adc1f123c123f339bd070") syz_execute_func(&(0x7f0000000000)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ffc44209a7b700000000c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 04:34:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:28 executing program 1: inotify_init1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl(r0, 0x20001000008912, &(0x7f0000000000)="0adc1f123c123f339bd070") syz_execute_func(&(0x7f0000000000)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ffc44209a7b700000000c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 04:34:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sync_file_range(r1, 0x0, 0x0, 0x3) 04:34:28 executing program 2: pause() syz_execute_func(&(0x7f0000000000)="3666440f50f564ff094170c3c3440f56d9660f3a16649c6700aeae617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f00000002c0)="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") 04:34:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:28 executing program 1: inotify_init1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl(r0, 0x20001000008912, &(0x7f0000000000)="0adc1f123c123f339bd070") syz_execute_func(&(0x7f0000000000)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ffc44209a7b700000000c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 04:34:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:28 executing program 2: clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000080)="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") 04:34:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sync_file_range(r1, 0x0, 0x0, 0x3) 04:34:28 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) syz_execute_func(&(0x7f0000000840)="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") 04:34:28 executing program 4: syz_execute_func(&(0x7f0000001180)="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") 04:34:28 executing program 1: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ffc44209a7b700000000c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 04:34:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sync_file_range(r1, 0x0, 0x0, 0x3) 04:34:28 executing program 0: syz_execute_func(&(0x7f0000000040)="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") syz_execute_func(&(0x7f0000000440)="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") 04:34:28 executing program 1: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ffc44209a7b700000000c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 04:34:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sync_file_range(r1, 0x0, 0x0, 0x3) 04:34:28 executing program 1: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ffc44209a7b700000000c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 04:34:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000080), 0x4d2) 04:34:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) 04:34:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/129, 0x81) 04:34:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:34:29 executing program 1: inotify_init1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f0000000000)="0adc1f123c123f339bd070") syz_execute_func(&(0x7f0000000000)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ffc44209a7b700000000c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 04:34:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) 04:34:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/129, 0x81) 04:34:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000080), 0x4d2) 04:34:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, &(0x7f0000000240)={0x0, 0x0, [], {0x0, @bt={0x5, 0x0, 0x0, 0x0, 0x9, 0x0, 0x7f, 0x1, 0x10001, 0x3ff, 0x18c22313, 0x0, 0x0, 0x6, 0x1, 0x4}}}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000000)="0f015b0fc4c3b96dcbe1c4e2699ae60f32f30f6f11b9800000c00f3235000100000f300fae1e2e64660f3a0a03b00f01c80f30", 0x33}], 0x1, 0xe, &(0x7f0000000080), 0x0) r3 = socket$packet(0x11, 0x8000800000003, 0x300) setsockopt$packet_int(r3, 0x107, 0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8001, 0x4000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:34:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) [ 177.660923][ T9121] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 04:34:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000080), 0x4d2) 04:34:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/129, 0x81) 04:34:29 executing program 1: inotify_init1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f0000000000)="0adc1f123c123f339bd070") syz_execute_func(&(0x7f0000000000)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ffc44209a7b700000000c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") [ 177.883053][ T9139] kasan: CONFIG_KASAN_INLINE enabled [ 177.888559][ T9139] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 177.896641][ T9139] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 177.903699][ T9139] CPU: 0 PID: 9139 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190430 #33 [ 177.913088][ T9139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.923164][ T9139] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 04:34:30 executing program 1: inotify_init1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f0000000000)="0adc1f123c123f339bd070") syz_execute_func(&(0x7f0000000000)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ffc44209a7b700000000c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 04:34:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x305) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/129, 0x81) [ 177.928893][ T9139] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 177.948600][ T9139] RSP: 0018:ffff888066d57a00 EFLAGS: 00010006 [ 177.954713][ T9139] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc900061e3000 [ 177.962699][ T9139] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 177.969200][ T3878] kobject: 'loop2' (000000002b8792cc): kobject_uevent_env [ 177.970675][ T9139] RBP: ffff888066d57b10 R08: ffff888066840040 R09: ffffed1015d06be0 [ 177.970685][ T9139] R10: ffffed1015d06bdf R11: ffff8880ae835efb R12: ffff8880671d806c [ 177.970693][ T9139] R13: 0000000000000000 R14: ffff8880671d8070 R15: ffff8880671d8040 [ 177.970713][ T9139] FS: 00007f4011f31700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 177.977935][ T3878] kobject: 'loop2' (000000002b8792cc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 177.985879][ T9139] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 177.985887][ T9139] CR2: 0000001b2dc26000 CR3: 0000000092df4000 CR4: 00000000001426f0 [ 177.985895][ T9139] Call Trace: [ 177.985919][ T9139] ? emulator_read_emulated+0x50/0x50 [ 177.985935][ T9139] ? lock_acquire+0x16f/0x3f0 [ 177.985948][ T9139] ? kvm_arch_vcpu_ioctl_run+0x240/0x1750 [ 177.985970][ T9139] kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 177.994634][ T3878] kobject: 'loop3' (00000000362f7544): kobject_uevent_env [ 178.001940][ T9139] ? kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 178.001958][ T9139] kvm_vcpu_ioctl+0x4dc/0xf90 [ 178.001973][ T9139] ? kvm_set_memory_region+0x50/0x50 [ 178.001990][ T9139] ? tomoyo_path_number_perm+0x263/0x520 [ 178.002017][ T9139] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 178.011143][ T3878] kobject: 'loop3' (00000000362f7544): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 178.021107][ T9139] ? __fget+0x35a/0x550 [ 178.021125][ T9139] ? kvm_set_memory_region+0x50/0x50 [ 178.021142][ T9139] do_vfs_ioctl+0xd6e/0x1390 [ 178.021160][ T9139] ? ioctl_preallocate+0x210/0x210 [ 178.021183][ T9139] ? __fget+0x381/0x550 [ 178.067791][ T3878] kobject: 'loop5' (000000000f5fe4ac): kobject_uevent_env [ 178.073136][ T9139] ? ksys_dup3+0x3e0/0x3e0 [ 178.073152][ T9139] ? nsecs_to_jiffies+0x30/0x30 [ 178.073170][ T9139] ? tomoyo_file_ioctl+0x23/0x30 [ 178.073193][ T9139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 178.078000][ T3878] kobject: 'loop5' (000000000f5fe4ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 178.083151][ T9139] ? security_file_ioctl+0x93/0xc0 [ 178.083170][ T9139] ksys_ioctl+0xab/0xd0 [ 178.083188][ T9139] __x64_sys_ioctl+0x73/0xb0 [ 178.083204][ T9139] do_syscall_64+0x103/0x670 [ 178.083229][ T9139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.107428][ T3878] kobject: 'loop1' (000000004327ee88): kobject_uevent_env [ 178.108950][ T9139] RIP: 0033:0x458da9 [ 178.108967][ T9139] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 178.108975][ T9139] RSP: 002b:00007f4011f30c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 178.108988][ T9139] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 178.109004][ T9139] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 178.115532][ T3878] kobject: 'loop1' (000000004327ee88): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 178.118883][ T9139] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 178.118892][ T9139] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4011f316d4 [ 178.118900][ T9139] R13: 00000000004c1d42 R14: 00000000004d4550 R15: 00000000ffffffff [ 178.118912][ T9139] Modules linked in: [ 178.118942][ T9139] ---[ end trace 0c7e8516dba1959f ]--- [ 178.168824][ T3878] kobject: 'loop3' (00000000362f7544): kobject_uevent_env [ 178.171203][ T9139] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 178.175377][ T3878] kobject: 'loop3' (00000000362f7544): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 178.179940][ T9139] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 178.179948][ T9139] RSP: 0018:ffff888066d57a00 EFLAGS: 00010006 [ 178.179958][ T9139] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc900061e3000 [ 178.179964][ T9139] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 178.179971][ T9139] RBP: ffff888066d57b10 R08: ffff888066840040 R09: ffffed1015d06be0 [ 178.179979][ T9139] R10: ffffed1015d06bdf R11: ffff8880ae835efb R12: ffff8880671d806c [ 178.179986][ T9139] R13: 0000000000000000 R14: ffff8880671d8070 R15: ffff8880671d8040 [ 178.180005][ T9139] FS: 00007f4011f31700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 178.386954][ T9139] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 178.393521][ T9139] CR2: 0000001b2dc26000 CR3: 0000000092df4000 CR4: 00000000001426f0 [ 178.401494][ T9139] Kernel panic - not syncing: Fatal exception [ 178.408643][ T9139] Kernel Offset: disabled [ 178.413059][ T9139] Rebooting in 86400 seconds..