3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:02:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2205.271103][ T27] audit: type=1804 audit(1684076578.618:432): pid=15396 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2221/cgroup.controllers" dev="sda1" ino=1970 res=1 errno=0 [ 2205.909560][T15427] loop4: detected capacity change from 0 to 65536 [ 2205.920994][T15427] XFS (loop4): Mounting V4 Filesystem 5e6273b8-2167-42bb-911b-418aa14a1261 [ 2205.950204][T15427] XFS (loop4): Ending clean mount [ 2205.955893][T15427] xfs filesystem being mounted at /root/syzkaller-testdir3652176882/syzkaller.2Oreo2/2575/file0 supports timestamps until 2038-01-19 (0x7fffffff) 15:02:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:02:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:02:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:02:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:02:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:02:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:02:59 executing program 4: syz_mount_image$xfs(&(0x7f000000bb00), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000019c0)=ANY=[@ANYBLOB="001cf57093eea3e8e5ef0b5f29b50d927055d2dcc21347b41fcc36fea222a8f1de8cda11bccaee4a723c13889e055381fc820fb2c0d5db745bd8835ccb442c579a6da928d9c09a24fa04553db8235250d35b4436"], 0x1, 0xbaed, &(0x7f00000176c0)="$eJzs2k9PHGUcB/DfLiwt9VDTm3qBVq0eFKg2hFt3TVpXEy5y4GSKLWIjtaZw6B8T8epJX0Jfg40xMTEefRXGN9CDiWfXzM4My/4RSoaHRfl8ku7MMzP7Y777e2a2yezq9Y9aEfXoqsWQjz/Z+ml2o/Xz9680v33ywYW1fOvOtWL3TLGcLZYXI+JsxE62XhR94drTp/WsdH1v3enps7XzES8Vw7LeYr7463F5XGdAsfnFcv9Efj7Fn6sPB2Bfq80b13ud7/ZtMiIaxe7anllRK/ZNRnz9S/6P/7rV5o32QP+za3Gq2JZdjzOD1+BpNOY2JVNkO5Pft2M6Is6N+7Pm+DRbK63sWi/HEdEq7u0t9/j/v2Zr5T39P73azdbKQP+z/9Mv5qO/x316AAAcsa2Hjz5f29xcv2/FihUruyvjvjNxHHpNH/eZMA7HcTsZd0b+XXu5+aze/9x/Ys/67p5bX/35++KPPzwul8XmD0eU7HsI3+l0Ot2HyTONmP/0zub6fLb7UiPezwYLWf3XG3EzG1zJBpcb8SAbvNMdTMd32eDtW/c2b2cb3jja8N38O1Hv/9nAiF9B5PnfvDf7W7ncp2RZbTJ6z9dOrMPlX/isXO5Tcqj/R3SqSYyY/3vPvzY47wfm/8xwxfND+bsbdud/9sdeLef/mYh4LUWu59Ve/ubZPv0/IP/ky8VxE733DufvK36z7/4ydu3lJ52B/h8if1weUXIo/9z23S/nth4+euvO3bWN9Y31L96dvzq/tLSwdHVprjsl8tcU8Q5Urf9xbuA9Wf/7Ps2h/v86+v6SxMV6TE3Fg7Xt7fsL+Ws5vJK/jsx/iOv/UvmFdKE8/qD5P9U79kSo2P/bA+85+Pr/4xj7/xzay2l/NXjyv//klz8d+eVPWL4y+eWXPx355U9YvjL55Zc/HfnlT1i+Mvnllz8d+eVPWL4y+eWXPx355U9YvjL55Zc/HfnlT1i+Mvnllz8d+eVPWL4y+eWXPx355U9YvjL55Zc/HfnlT1i+stOeHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD+YQcOBAAAAACA/F8boaqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqgo7cCAAAAAAAOT/2ghVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV2KdjlYahKAzA516rtDgobuKib9J0aNHVJZOgiw9gHyCzm4/gK0gFwddyV0JuoERBB6VIv29K8sPJufwJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8V/X8chaRu5v0Ob+6uXs5u529PpxU948XR9fd02Za4tP3gYgYRzRtVobuT1er3I7O63Mnk3E6iHT89VZvT9+sfdhf7HT7lNflH56aXl0t5qX5VHobRcRuidPaV5FKNopYPkcsm81tzW+pq8X5oP/WXt/78P/eVhst6Q+Vs32wd9fhmpUF3/f3DAypgohKGDQYdIfCDNKISigW0qGUgEpJ2KLS3d3d3d3d3d2d7zEw8CD+8OZ53/t5uR9/n89xzLX22te1r3We+7vWuvb8dY76zn17YPSBgYExPu7fNf//GTpsyWHDPzjf3R/+gT0wMDDzwMCYm7nH/+cbOmzJefXvtdDQYUsOvO9z/uMeDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8T/LmE6eeOWKt78EDA5sMfGC997eNWBd00NFnX331xzbQ/xkGLbP8uidPvMqw07aZcOgW+yw8znLvWzP9/1bDO4926EQDA2su9XEPhY/BoI97AHys9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn83/bvp303/bvp307+b/t3076Z/N/276d9N/276d9O/m/7d9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn83/bvp303/bvp307+b/t3076Z/N/276d9N/276d9O/m/7d9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn83/bvp303/Yh+y/v88724vW+CtNUa8dPJxL9h78+FfrPaxjvhj9Z+6/v/AaoMGBkb0HXt438WGLr7kVAMDA5vvfcG4kwy899xsw5+bc5yRBkZ6+0enevtx8g9547Hfvx3y3nss+/b7L/TWPoMHfWAQ73PnMxuvsNFxJ876we2UHz6Pwe/fGXGsqYYfa9r11lh72nU32HDq1dZYbpWVVllpzZmmm3m62WeffvaZZ5925dVWX2m6dx4/ZI4Tvf046UeZ40gfnOMTQ98/x8EfcY4TfegUx0pznGi1d997oiED0709leEHnWzIwILDd6Yf9X3X7njDXzvXOIMHBmYb9O54Bg0a8fsf8ZrNhr9m6aELLPS/srx9jg+/J4wy4nuzDj/aW/8H/ct4Jxr09sEHRgzgg+NdaOiwJYd/+92fHxFu1nf23vzws+a/ST53Fn378cN6jv2B7b87d0b6kPf44LmzyIcPMZ07wwc4aMjA+8+d4S+b9N1zZ/gIphgysOzwnRmG70w5ZGD94Tszvr0z+sDWw3emWWGt1Vcc9Pb94F+6TTXovWv7Q86z+T9wno38zt3in37k3a9Hfuffpme+8+//u3SeffDg7x/v0GFLzvuB82zYiLEM++8a0//ueEf+9+Md9l+M9//o33//Mt6t/9fhRvzR8U/jHWGeEdtZ39k8v9F/cZh3L6ER18lmI975g3fcjzze967jIe97+6n+i4O/vR3tX67jzQe/bxgf9XNuxfD6d76OnwFjf/BvskF3Dwz6d3OZ8kOG9E9zGfXfz+Wjfp5NNeLDc5z/l3MZZWBgnH+ey8gD8w3/hBsx2ikGsn+ayyj/PV3GCK8fMZdBH2Uug85+r8tkbz83yeCBUUYZWH+59dZbZ/p3Ht/dneGdx39/Tk72UeY+8r+d+6CPOvcJRtxoRvrXuX+0c3LZgZHe+z/E//6lyf8Z/v/fTf9u+nfTv5v+3fTvpn83/bvp303/bvp307+b/t3076Z/N/276d9N/276d9O/m/7d9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn83/bvp303/bvp307+b/t3076Z/N/276d9N/276d9O/m/7d9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn83/bvpX+xD1v/f7N31/6/YdehNI9bjHXL12avO8XGP92P2H73+/4i+/7T+/xyrnn314IH3nvvQdZxHfe81g95Z13v+JYa9t0JwuMP86+9xuM3eXff53SXTJx6xneSdlZXf/l2PeNMx5zn++MHD3/qfVpIdffTRBo01MDD+iN0PXUf6g+vNj/j2f9s60h+3d6/Vj7DOrvt/N/276d9N/276d9O/m/7d9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn83/bvp303/bvp307+b/t3076Z/N/276d9N/276d9O/m/7d9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn83/bvp303/bvp307+b/t3076Z/N/276d9N/276d9O/m/7d9O+mfzf9u+nfTf9u+nfTv9iHrP9/9ojtZssdd9IuIxZCH7LX1qOs8HGP92P2H73+/4i+/7T+/wqjbL3X4IH3nvu36/+/8xrr//9P8O61av1//gv6d9O/m/7d9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn83/bvp303/bvp307+b/t3076Z/N/276d9N/276d9O/m/7d9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn83/bvp303/bvp307+b/t3076Z/N/276d9N/276d9O/m/7d9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn+xvP7/oBHbgbO3WWmWuYdvh++vO9GxQz7u8X7M/lPX/x/t0IkGBtZc6uMeCh8D9/9u+nfTv5v+3fTvpn83/bvp303/bvp307+b/t3076Z/N/276d9N/276d9O/m/7d9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn83/bvp303/bvp307+b/t3076Z/N/276d9N/276d9O/m/7d9O+mfzf9u+nfTf9u+nfTv5v+3fTvpn83/bvp303/bvp307+b/t3076Z/sRHr/w+8s/7/uwbN47yIwvr//3f7kP5D9Y9a+g/TP2rpP6/+UUv/b+kftfSfT/+opf/8+kct/RfQP2rpv6D+UUv/hfSPWvovrH/U0n8R/aOW/ovqH7X0/7b+UUv/xfSPWvp/R/+opf939Y9a+n9P/6il/+L6Ry39l9A/aum/pP5RS/+l9I9a+n9f/6il/w/0j1r6L61/1NL/h/pHLf1/pH/U0v/H+kct/X+if9TS/6f6Ry39l9E/aun/M/2jlv7L6h+19F9O/6il//L6Ry39V9A/aum/ov5RS/+V9I9a+q+sf9TSfxX9o5b+q+oftfRfTf+opf/P9Y9a+v9C/6il/+r6Ry3919A/aum/pv5RS/+19I9a+q+tf9TS/5f6Ry3919E/aum/rv5RS//19I9a+v9K/6il/6/1j1r6/0b/qKX/+vpHLf030D9q6b+h/lFL/430j1r6b6x/1NL/t/pHLf030T9q6b+p/lFL/830j1r6b65/1NL/d/pHLf1/r3/U0v8P+kct/f+of9TS/0/6Ry39/6x/1NL/L/pHLf3/qn/U0n8L/aOW/n/TP2rp/3f9o5b+/9A/aum/pf5RS/+t9I9a+m+tf9TSfxv9o5b+2+oftfTfTv+opf/2+kct/XfQP2rpv6P+UUv/nfSPWvrvrH/U0n8X/aOW/rvqH7X0303/qKX/7vpHLf330D9q6b+n/lFL/730j1r6761/1NJ/H/2jlv776h+19N9P/6il//76Ry39D9A/aul/oP5RS/+D9I9a+h+sf9TS/xD9o5b+h+oftfQ/TP+opf/h+kct/Y/QP2rpf6T+UUv/o/SPWvofrX/U0v8Y/aOW/sfqH7X0P07/qKX/8fpHLf1P0D9q6X+i/lFL/5P0j1r6n6x/1NL/FP2jlv6n6h+19D9N/6il/+n6Ry39z9A/aul/pv5RS/+z9I9a+p+tf9TS/xz9o5b+5+oftfQ/T/+opf/5+kct/S/QP2rpf6H+UUv/i/SPWvpfrH/U0v8S/aOW/pfqH7X0v0z/qKX/5fpHLf2v0D9q6X+l/lFL/6v0j1r6X61/1NL/Gv2jlv7X6h+19L9O/6il//X6Ry39b9A/aul/o/5RS/+b9I9a+t+sf9TS/xb9o5b+t+oftfS/Tf+opf/t+kct/e/QP2rpf6f+UUv/u/SPWvrfrX/U0v8e/aOW/vfqH7X0v0//qKX//fpHLf0f0D9q6f+g/lFL/4f0j1r6P6x/1NL/Ef2jlv6P6h+19H9M/6il/+P6Ry39n9A/aun/pP5RS/+n9I9a+j+tf9TS/xn9o5b+z+oftfR/Tv+opf/z+kct/V/QP2rp/6L+UUv/l/SPWvq/rH/U0v8V/aOW/q/qH7X0f03/qKX/6/pHLf3f0D9q6f+m/lFL/7f0j0r6v/2l/v+qpf8g/aOW/oP1j1r6j6R/1NJ/ZP2jlv5D9I9a+o+if9TSf1T9o5b+o+kftfQfXf+opf8Y+kct/cfUP2rp/wn9o5b+n9Q/aun/Kf2jlv5j6R+19B9b/6il/6f1j1r6j6N/1NL/M/pHLf3H1T9q6f9Z/aOW/p/TP2rp/3n9o5b+4+kftfQfX/+opf8E+kct/SfUP2rp/wX9o5b+X9Q/aun/Jf2jlv5f1j9q6T+R/lFL/4n1j1r6T6J/1NJ/Uv2jlv6T6R+19J9c/6il/xT6Ry39p9Q/auk/lf5RS/+v6B+19P+q/lFL/6/pH7X0/7r+UUv/qfWPWvpPo3/U0n9a/aOW/tPpH7X0n17/qKX/DPpHLf1n1D9q6T+T/lFL/5n1j1r6z6J/1NJ/Vv2jlv6z6R+19J9d/6il/xz6Ry3959Q/auk/l/5RS/9v6B+19P+m/lFL/7n1j1r6z6N/1NJ/qP5RS/9h+kct/efVP2rp/y39o5b+8+kftfSfX/+opf8C+kct/RfUP2rpv5D+UUv/hfWPWvovon/U0n9R/aOW/t/WP2rpv5j+UUv/7+gftfT/rv5RS//v6R+19F9c/6il/xL6Ry39l9Q/aum/lP5RS//v6x+19P+B/lFL/6X1j1r6/1D/qKX/j/SPWvr/WP+opf9P9I9a+v9U/6il/zL6Ry39f6Z/1NJ/Wf2jlv7L6R+19F9e/6il/wr6Ry39V9Q/aum/kv5RS/+V9Y9a+q+if9TSf1X9o5b+q+kftfT/uf5RS/9f6B+19F9d/6il/xr6Ry3919Q/aum/lv5RS/+19Y9a+v9S/6il/zr6Ry3919U/aum/nv5RS/9f6R+19P+1/lFL/9/oH7X0X1//qKX/BvpHLf031D9q6b+R/lFL/431j1r6/1b/qKX/JvpHLf031T9q6b+Z/lFL/831j1r6/07/qKX/7/WPWvr/Qf+opf8f9Y9a+v9J/6il/5/1j1r6/0X/qKX/X/WPWvpvoX/U0v9v+kct/f+uf9TS/x/6Ry39t9Q/aum/lf5RS/+t9Y9a+m+jf9TSf1v9o5b+2+kftfTfXv+opf8O+kct/XfUP2rpv5P+UUv/nfWPWvrvon/U0n9X/aOW/rvpH7X0313/qKX/HvpHLf331D9q6b+X/lFL/731j1r676N/1NJ/X/2jlv776R+19N9f/6il/wH6Ry39D9Q/aul/kP5RS/+D9Y9a+h+if9TS/1D9o5b+h+kftfQ/XP+opf8R+kct/Y/UP2rpf5T+UUv/o/WPWvofo3/U0v9Y/aOW/sfpH7X0P17/qKX/CfpHLf1P1D9q6X+S/lFL/5P1j1r6n6J/1NL/VP2jlv6n6R+19D9d/6il/xn6Ry39z9Q/aul/lv5RS/+z9Y9a+p+jf9TS/1z9o5b+5+kftfQ/X/+opf8F+kct/S/UP2rpf5H+UUv/i/WPWvpfon/U0v9S/aOW/pfpH7X0v1z/qKX/FfpHLf2v1D9q6X+V/lFL/6v1j1r6X6N/1NL/Wv2jlv7X6R+19L9e/6il/w36Ry39b9Q/aul/k/5RS/+b9Y9a+t+if9TS/1b9o5b+t+kftfS/Xf+opf8d+kct/e/UP2rpf5f+UUv/u/WPWvrfo3/U0v9e/aOW/vfpH7X0v1//qKX/A/pHLf0f1D9q6f+Q/lFL/4f1j1r6P6J/1NL/Uf2jlv6P6R+19H9c/6il/xP6Ry39n9Q/aun/lP5RS/+n9Y9a+j+jf9TS/1n9o5b+z+kftfR/Xv+opf8L+kct/V/UP2rp/5L+UUv/l/WPWvq/on/U0v9V/aOW/q/pH7X0f13/qKX/G/pHLf3f1D9q6f+W/lFJ/5EG9I9a+g/SP2rpP1j/qKX/SPpHLf1H1j9q6T9E/6il/yj6Ry39R9U/auk/mv5RS//R9Y9a+o+hf9TSf0z9o5b+n9A/aun/Sf2jlv6f0j9q6T+W/lFL/7H1j1r6f1r/qKX/OPpHLf0/o3/U0n9c/aOW/p/VP2rp/zn9o5b+n9c/auk/nv5RS//x9Y9a+k+gf9TSf0L9o5b+X9A/aun/Rf2jlv5f0j9q6f9l/aOW/hPpH7X0n1j/qKX/JPpHLf0n1T9q6T+Z/lFL/8n1j1r6T6F/1NJ/Sv2jlv5T6R+19P+K/lFL/6/qH7X0/5r+UUv/r+sftfSfWv+opf80+kct/afVP2rpP53+UUv/6fWPWvrPoH/U0n9G/aOW/jPpH7X0n1n/qKX/LPpHLf1n1T9q6T+b/lFL/9n1j1r6z6F/1NJ/Tv2jlv5z6R+19P+G/lFL/2/qH7X0n1v/qKX/PPpHLf2H6h+19B+mf9TSf179o5b+39I/auk/n/5RS//59Y9a+i+gf9TSf0H9o5b+C+kftfRfWP+opf8i+kct/RfVP2rp/239o5b+i+kftfT/jv5RS//v6h+19P+e/lFL/8X1j1r6L6F/1NJ/Sf2jlv5L6R+19P++/lFL/x/oH7X0X1r/qKX/D/WPWvr/SP+opf+P9Y9a+v9E/6il/0/1j1r6L6N/1NL/Z/pHLf2X1T9q6b+c/lFL/+X1j1r6r6B/1NJ/Rf2jlv4r6R+19F9Z/6il/yr6Ry39V9U/aum/mv5RS/+f6x+19P+F/lFL/9X1j1r6r6F/1NJ/Tf2jlv5r6R+19F9b/6il/y/1j1r6r6N/1NJ/Xf2jlv7r6R+19P+V/lFL/1/rH7X0/43+UUv/9fWPWvpvoH/U0n9D/aOW/hvpH7X031j/qKX/b/WPWvpvon/U0n9T/aOW/pvpH7X031z/qKX/7/SPWvr/Xv+opf8f9I9a+v9R/6il/5/0j1r6/1n/qKX/X/SPWvr/Vf+opf8W+kct/f+mf9TS/+/6Ry39/6F/1NJ/S/2jlv5b6R+19N9a/6il/zb6Ry39t9U/aum/nf5RS//t9Y9a+u+gf9TSf0f9o5b+O+kftfTfWf+opf8u+kct/XfVP2rpv5v+UUv/3fWPWvrvoX/U0n9P/aOW/nvpH7X031v/qKX/PvpHLf331T9q6b+f/lFL//31j1r6H6B/1NL/QP2jlv4H6R+19D9Y/6il/yH6Ry39D9U/aul/mP5RS//D9Y9a+h+hf9TS/0j9o5b+R+kftfQ/Wv+opf8x+kct/Y/VP2rpf5z+UUv/4/WPWvqfoH/U0v9E/aOW/ifpH7X0P1n/qKX/KfpHLf1P1T9q6X+a/lFL/9P1j1r6n6F/1NL/TP2jlv5n6R+19D9b/6il/zn6Ry39z9U/aul/nv5RS//z9Y9a+l+gf9TS/0L9o5b+F+kftfS/WP+opf8l+kct/S/VP2rpf5n+UUv/y/WPWvpfoX/U0v9K/aOW/lfpH7X0v1r/qKX/NfpHLf2v1T9q6X+d/lFL/+v1j1r636B/1NL/Rv2jlv436R+19L9Z/6il/y36Ry39b9U/aul/m/5RS//b9Y9a+t+hf9TS/079o5b+d+kftfS/W/+opf89+kct/e/VP2rpf5/+UUv/+/WPWvo/oH/U0v9B/aOW/g/pH7X0f1j/qKX/I/pHLf0f1T9q6f+Y/lFL/8f1j1r6P6F/1NL/Sf2jlv5P6R+19H9a/6il/zP6Ry39n9U/aun/nP5RS//n9Y9a+r+gf9TS/0X9o5b+L+kftfR/Wf+opf8r+kct/V/VP2rp/5r+UUv/1/WPWvq/oX/U0v9N/aOW/m/pH5X0H3lA/6il/yD9o5b+g/WPWvqPpH/U0n9k/aOW/kP0j1r6j6J/1NJ/VP2jlv6j6R+19B9d/6il/xj6Ry39x9Q/aun/Cf2jlv6f1D9q6f8p/aOW/mPpH7X0H1v/qKX/p/WPWvqPo3/U0v8z+kct/cfVP2rp/1n9o5b+n9M/aun/ef2jlv7j6R+19B9f/6il/wT6Ry39J9Q/aun/Bf2jlv5f1D9q6f8l/aOW/l/WP2rpP5H+UUv/ifWPWvpPon/U0n9S/aOW/pPpH7X0n1z/qKX/FPpHLf2n1D9q6T+V/lFL/6/oH7X0/6r+UUv/r+kftfT/uv5RS/+p9Y9a+k+jf9TSf1r9o5b+0+kftfSfXv+opf8M+kct/WfUP2rpP5P+UUv/mfWPWvrPon/U0n9W/aOW/rPpH7X0n13/qKX/HPpHLf3n1D9q6T+X/lFL/2/oH7X0/6b+UUv/ufWPWvrPo3/U0n+o/lFL/2H6Ry3959U/aun/Lf2jlv7z6R+19J9f/6il/wL6Ry39F9Q/aum/kP5RS/+F9Y9a+i+if9TSf1H9o5b+39Y/aum/mP5RS//v6B+19P+u/lFL/+/pH7X0X1z/qKX/EvpHLf2X1D9q6b+U/lFL/+/rH7X0/4H+UUv/pfWPWvr/UP+opf+P9I9a+v9Y/6il/0/0j1r6/1T/qKX/MvpHLf1/pn/U0n9Z/aOW/svpH7X0X17/qKX/CvpHLf1X1D9q6b+S/lFL/5X1j1r6r6J/1NJ/Vf2jlv6r6R+19P+5/lFL/1/oH7X0X13/qKX/GvpHLf3X1D9q6b+W/lFL/7X1j1r6/1L/qKX/OvpHLf3X1T9q6b+e/lFL/1/pH7X0/7X+UUv/3+gftfRfX/+opf8G+kct/TfUP2rpv5H+UUv/jfWPWvr/Vv+opf8m+kct/TfVP2rpv5n+UUv/zfWPWvr/Tv+opf/v9Y9a+v9B/6il/x/1j1r6/0n/qKX/n/WPWvr/Rf+opf9f9Y9a+m+hf9TS/2/6Ry39/65/1NL/H/pHLf231D9q6b+V/lFL/631j1r6b6N/1NJ/W/2jlv7b6R+19N9e/6il/w76Ry39d9Q/aum/k/5RS/+d9Y9a+u+if9TSf1f9o5b+u+kftfTfXf+opf8e+kct/ffUP2rpv5f+UUv/vfWPWvrvo3/U0n9f/aOW/vvpH7X031//qKX/AfpHLf0P1D9q6X+Q/lFL/4P1j1r6H6J/1NL/UP2jlv6H6R+19D9c/6il/xH6Ry39j9Q/aul/lP5RS/+j9Y9a+h+jf9TS/1j9o5b+x+kftfQ/Xv+opf8J+kct/U/UP2rpf5L+UUv/k/WPWvqfon/U0v9U/aOW/qfpH7X0P13/qKX/GfpHLf3P1D9q6X+W/lFL/7P1j1r6n6N/1NL/XP2jlv7n6R+19D9f/6il/wX6Ry39L9Q/aul/kf5RS/+L9Y9a+l+if9TS/1L9o5b+l+kftfS/XP+opf8V+kct/a/UP2rpf5X+UUv/q/WPWvpfo3/U0v9a/aOW/tfpH7X0v17/qKX/DfpHLf1v1D9q6X+T/lFL/5v1j1r636J/1NL/Vv2jlv636R+19L9d/6il/x36Ry3979Q/aul/l/5RS/+79Y9a+t+jf9TS/179o5b+9+kftfS/X/+opf8D+kct/R/UP2rp/5D+UUv/h/WPWvo/on/U0v9R/aOW/o/pH7X0f1z/qKX/E/pHLf2f1D9q6f+U/lFL/6f1j1r6P6N/1NL/Wf2jlv7P6R+19H9e/6il/wv6Ry39X9Q/aun/kv5RS/+X9Y9a+r+if9TS/1X9o5b+r+kftfR/Xf+opf8b+kct/d/UP2rp/5b+UUn/IQP6Ry39B+kftfQfrH/U0n8k/aOW/iPrH7X0H6J/1NJ/FP2jlv6j6h+19B9N/6il/+j6Ry39x9A/auk/pv5RS/9P6B+19P+k/lFL/0/pH7X0H0v/qKX/2PpHLf0/rX/U0n8c/aOW/p/RP2rpP67+UUv/z+oftfT/nP5RS//P6x+19B9P/6il//j6Ry39J9A/auk/of5RS/8v6B+19P+i/lFL/y/pH7X0/7L+UUv/ifSPWvpPrH/U0n8S/aOW/pPqH7X0n0z/qKX/5PpHLf2n0D9q6T+l/lFL/6n0j1r6f0X/qKX/V/WPWvp/Tf+opf/X9Y9a+k+tf9TSfxr9o5b+0+oftfSfTv+opf/0+kct/WfQP2rpP6P+UUv/mfSPWvrPrH/U0n8W/aOW/rPqH7X0n03/qKX/7PpHLf3n0D9q6T+n/lFL/7n0j1r6f0P/qKX/N/WPWvrPrX/U0n8e/aOW/kP1j1r6D9M/auk/r/5RS/9v6R+19J9P/6il//z6Ry39F9A/aum/oP5RS/+F9I9a+i+sf9TSfxH9o5b+i+oftfT/tv5RS//F9I9a+n9H/6il/3f1j1r6f0//qKX/4vpHLf2X0D9q6b+k/lFL/6X0j1r6f1//qKX/D/SPWvovrX/U0v+H+kct/X+kf9TS/8f6Ry39f6J/1NL/p/pHLf2X0T9q6f8z/aOW/svqH7X0X07/qKX/8vpHLf1X0D9q6b+i/lFL/5X0j1r6r6x/1NJ/Ff2jlv6r6h+19F9N/6il/8/1j1r6/0L/qKX/6vpHLf3X0D9q6b+m/lFL/7X0j1r6r61/1NL/l/pHLf3X0T9q6b+u/lFL//X0j1r6/0r/qKX/r/WPWvr/Rv+opf/6+kct/TfQP2rpv6H+UUv/jfSPWvpvrH/U0v+3+kct/TfRP2rpv6n+UUv/zfSPWvpvrn/U0v93+kct/X+vf9TS/w/6Ry39/6h/1NL/T/pHLf3/rH/U0v8v+kct/f+qf9TSfwv9o5b+f9M/aun/d/2jlv7/0D9q6b+l/lFL/630j1r6b61/1NJ/G/2jlv7b6h+19N9O/6il//b6Ry39d9A/aum/o/5RS/+d9I9a+u+sf9TSfxf9o5b+u+oftfTfTf+opf/u+kct/ffQP2rpv6f+UUv/vfSPWvrvrX/U0n8f/aOW/vvqH7X030//qKX//vpHLf0P0D9q6X+g/lFL/4P0j1r6H6x/1NL/EP2jlv6H6h+19D9M/6il/+H6Ry39j9A/aul/pP5RS/+j9I9a+h+tf9TS/xj9o5b+x+oftfQ/Tv+opf/x+kct/U/QP2rpf6L+UUv/k/SPWvqfrH/U0v8U/aOW/qfqH7X0P03/qKX/6fpHLf3P0D9q6X+m/lFL/7P0j1r6n61/1NL/HP2jlv7n6h+19D9P/6il//n6Ry39L9A/aul/of5RS/+L9I9a+l+sf9TS/xL9o5b+l+oftfS/TP+opf/l+kct/a/QP2rpf6X+UUv/q/SPWvpfrX/U0v8a/aOW/tfqH7X0v07/qKX/9fpHLf1v0D9q6X+j/lFL/5v0j1r636x/1NL/Fv2jlv636h+19L9N/6il/+36Ry3979A/aul/p/5RS/+79I9a+t+tf9TS/x79o5b+9+oftfS/T/+opf/9+kct/R/QP2rp/6D+UUv/h/SPWvo/rH/U0v8R/aOW/o/qH7X0f0z/qKX/4/pHLf2f0D9q6f+k/lFL/6f0j1r6P61/1NL/Gf2jlv7P6h+19H9O/6il//P6Ry39X9A/aun/ov5RS/+X9I9a+r+sf9TS/xX9o5b+r+oftfR/Tf+opf/r+kct/d/QP2rp/6b+UUv/t/SPSvqPMqB/1NJ/kP5RS//B+kct/UfSP2rpP7L+UUv/IfpHLf1H0T9q6T+q/lFL/9H0j1r6j65/1NJ/DP2jlv5j6h+19P+E/lFL/0/qH7X0/5T+UUv/sfSPWvqPrX/U0v/T+kct/cfRP2rp/xn9o5b+4+oftfT/rP5RS//P6R+19P+8/lFL//H0j1r6j69/1NJ/Av2jlv4T6h+19P+C/lFL/y/qH7X0/5L+UUv/L+sftfSfSP+opf/E+kct/SfRP2rpP6n+UUv/yfSPWvpPrn/U0n8K/aOW/lPqH7X0n0r/qKX/V/SPWvp/Vf+opf/X9I9a+n9d/6il/9T6Ry39p9E/auk/rf5RS//p9I9a+k+vf9TSfwb9o5b+M+oftfSfSf+opf/M+kct/WfRP2rpP6v+UUv/2fSPWvrPrn/U0n8O/aOW/nPqH7X0n0v/qKX/N/SPWvp/U/+opf/c+kct/efRP2rpP1T/qKX/MP2jlv7z6h+19P+W/lFL//n0j1r6z69/1NJ/Af2jlv4L6h+19F9I/6il/8L6Ry39F9E/aum/qP5RS/9v6x+19F9M/6il/3f0j1r6f1f/qKX/9/SPWvovrn/U0n8J/aOW/kvqH7X0X0r/qKX/9/WPWvr/QP+opf/S+kct/X+of9TS/0f6Ry39f6x/1NL/J/pHLf1/qn/U0n8Z/aOW/j/TP2rpv6z+UUv/5fSPWvovr3/U0n8F/aOW/ivqH7X0X0n/qKX/yvpHLf1X0T9q6b+q/lFL/9X0j1r6/1z/qKX/L/SPWvqvrn/U0n8N/aOW/mvqH7X0X0v/qKX/2vpHLf1/qX/U0n8d/aOW/uvqH7X0X0//qKX/r/SPWvr/Wv+opf9v9I9a+q+vf9TSfwP9o5b+G+oftfTfSP+opf/G+kct/X+rf9TSfxP9o5b+m+oftfTfTP+opf/m+kct/X+nf9TS//f6Ry39/6B/1NL/j/pHLf3/pH/U0v/P+kct/f+if9TS/6/6Ry39t9A/aun/N/2jlv5/1z9q6f8P/aOW/lvqH7X030r/qKX/1vpHLf230T9q6b+t/lFL/+30j1r6b69/1NJ/B/2jlv476h+19N9J/6il/876Ry39d9E/aum/q/5RS//d9I9a+u+uf9TSfw/9o5b+e+oftfTfS/+opf/e+kct/ffRP2rpv6/+UUv//fSPWvrvr3/U0v8A/aOW/gfqH7X0P0j/qKX/wfpHLf0P0T9q6X+o/lFL/8P0j1r6H65/1NL/CP2jlv5H6h+19D9K/6il/9H6Ry39j9E/aul/rP5RS//j9I9a+h+vf9TS/wT9o5b+J+oftfQ/Sf+opf/J+kct/U/RP2rpf6r+UUv/0/SPWvqfrn/U0v8M/aOW/mfqH7X0P0v/qKX/2fpHLf3P0T9q6X+u/lFL//P0j1r6n69/1NL/Av2jlv4X6h+19L9I/6il/8X6Ry39L9E/aul/qf5RS//L9I9a+l+uf9TS/wr9o5b+V+oftfS/Sv+opf/V+kct/a/RP2rpf63+UUv/6/SPWvpfr3/U0v8G/aOW/jfqH7X0v0n/qKX/zfpHLf1v0T9q6X+r/lFL/9v0j1r6365/1NL/Dv2jlv536h+19L9L/6il/936Ry3979E/aul/r/5RS//79I9a+t+vf9TS/wH9o5b+D+oftfR/SP+opf/D+kct/R/RP2rp/6j+UUv/x/SPWvo/rn/U0v8J/aOW/k/qH7X0f0r/qKX/0/pHLf2f0T9q6f+s/lFL/+f0j1r6P69/1NL/Bf2jlv4v6h+19H9J/6il/8v6Ry39X9E/aun/qv5RS//X9I9a+r+uf9TS/w39o5b+b+oftfR/S/+opP+oA/pHLf0H6R+19B+sf9TSfyT9o5b+I+sftfQfon/U0n8U/aOW/qPqH7X0H03/qKX/6PpHLf3H0D9q6T+m/lFL/0/oH7X0/6T+UUv/T+kftfQfS/+opf/Y+kct/T+tf9TSfxz9o5b+n9E/auk/rv5RS//P6h+19P+c/lFL/8/rH7X0H0//qKX/+PpHLf0n0D9q6T+h/lFL/y/oH7X0/6L+UUv/L+kftfT/sv5RS/+J9I9a+k+sf9TSfxL9o5b+k+oftfSfTP+opf/k+kct/afQP2rpP6X+UUv/qfSPWvp/Rf+opf9X9Y9a+n9N/6il/9f1j1r6T61/1NJ/Gv2jlv7T6h+19J9O/6il//T6Ry39Z9A/auk/o/5RS/+Z9I9a+s+sf9TSfxb9o5b+s+oftfSfTf+opf/s+kct/efQP2rpP6f+UUv/ufSPWvp/Q/+opf839Y9a+s+tf9TSfx79o5b+Q/WPWvoP0z9q6T+v/lFL/2/pH7X0n0//qKX//PpHLf0X0D9q6b+g/lFL/4X0j1r6L6x/1NJ/Ef2jlv6L6h+19P+2/lFL/8X0j1r6f0f/qKX/d/WPWvp/T/+opf/i+kct/ZfQP2rpv6T+UUv/pfSPWvp/X/+opf8P9I9a+i+tf9TS/4f6Ry39f6R/1NL/x/pHLf1/on/U0v+n+kct/ZfRP2rp/zP9o5b+y+oftfRfTv+opf/y+kct/VfQP2rpv6L+UUv/lfSPWvqvrH/U0n8V/aOW/qvqH7X0X03/qKX/z/WPWvr/Qv+opf/q+kct/dfQP2rpv6b+UUv/tfSPWvqvrX/U0v+X+kct/dfRP2rpv67+UUv/9fSPWvr/Sv+opf+v9Y9a+v9G/6il//r6Ry39N9A/aum/of5RS/+N9I9a+m+sf9TS/7f6Ry39N9E/aum/qf5RS//N9I9a+m+uf9TS/3f6Ry39f69/1NL/D/pHLf3/qH/U0v9P+kct/f+sf9TS/y/6Ry39/6p/1NJ/C/2jlv5/0z9q6f93/aOW/v/QP2rpv6X+UUv/rfSPWvpvrX/U0n8b/aOW/tvqH7X0307/qKX/9vpHLf130D9q6b+j/lFL/530j1r676x/1NJ/F/2jlv676h+19N9N/6il/+76Ry3999A/aum/p/5RS/+99I9a+u+tf9TSfx/9o5b+++oftfTfT/+opf/++kct/Q/QP2rpf6D+UUv/g/SPWvofrH/U0v8Q/aOW/ofqH7X0P0z/qKX/4fpHLf2P0D9q6X+k/lFL/6P0j1r6H61/1NL/GP2jlv7H6h+19D9O/6il//H6Ry39T9A/aul/ov5RS/+T9I9a+p+sf9TS/xT9o5b+p+oftfQ/Tf+opf/p+kct/c/QP2rpf6b+UUv/s/SPWvqfrX/U0v8c/aOW/ufqH7X0P0//qKX/+fpHLf0v0D9q6X+h/lFL/4v0j1r6X6x/1NL/Ev2jlv6X6h+19L9M/6il/+X6Ry39r9A/aul/pf5RS/+r9I9a+l+tf9TS/xr9o5b+1+oftfS/Tv+opf/1+kct/W/QP2rpf6P+UUv/m/SPWvrfrH/U0v8W/aOW/rfqH7X0v03/qKX/7fpHLf3v0D9q6X+n/lFL/7v0j1r6361/1NL/Hv2jlv736h+19L9P/6il//36Ry39H9A/aun/oP5RS/+H9I9a+j+sf9TS/xH9o5b+j+oftfR/TP+opf/j+kct/Z/QP2rp/6T+UUv/p/SPWvo/rX/U0v8Z/aOW/s/qH7X0f07/qKX/8/pHLf1f0D9q6f+i/lFL/5f0j1r6v6x/1NL/Ff2jlv6v6h+19H9N/6il/+v6Ry3939A/aun/pv5RS/+39I9K+o82oH/U0n+Q/lFL/8H6Ry39R9I/auk/sv5RS/8h+kct/UfRP2rpP6r+UUv/0fSPWvqPrn/U0n8M/aOW/mPqH7X0/4T+UUv/T+oftfT/lP5RS/+x9I9a+o+tf9TS/9P6Ry39x9E/aun/Gf2jlv7j6h+19P+s/lFL/8/pH7X0/7z+UUv/8fSPWvqPr3/U0n8C/aOW/hPqH7X0/4L+UUv/L+oftfT/kv5RS/8v6x+19J9I/6il/8T6Ry39J9E/auk/qf5RS//J9I9a+k+uf9TSfwr9o5b+U+oftfSfSv+opf9X9I9a+n9V/6il/9f0j1r6f13/qKX/1PpHLf2n0T9q6T+t/lFL/+n0j1r6T69/1NJ/Bv2jlv4z6h+19J9J/6il/8z6Ry39Z9E/auk/q/5RS//Z9I9a+s+uf9TSfw79o5b+c+oftfSfS/+opf839I9a+n9T/6il/9z6Ry3959E/auk/VP+opf8w/aOW/vPqH7X0/5b+UUv/+fSPWvrPr3/U0n8B/aOW/gvqH7X0X0j/qKX/wvpHLf0X0T9q6b+o/lFL/2/rH7X0X0z/qKX/d/SPWvp/V/+opf/39I9a+i+uf9TSfwn9o5b+S+oftfRfSv+opf/39Y9a+v9A/6il/9L6Ry39f6h/1NL/R/pHLf1/rH/U0v8n+kct/X+qf9TSfxn9o5b+P9M/aum/rP5RS//l9I9a+i+vf9TSfwX9o5b+K+oftfRfSf+opf/K+kct/VfRP2rpv6r+UUv/1fSPWvr/XP+opf8v9I9a+q+uf9TSfw39o5b+a+oftfRfS/+opf/a+kct/X+pf9TSfx39o5b+6+oftfRfT/+opf+v9I9a+v9a/6il/2/0j1r6r69/1NJ/A/2jlv4b6h+19N9I/6il/8b6Ry39f6t/1NJ/E/2jlv6b6h+19N9M/6il/+b6Ry39f6d/1NL/9/pHLf3/oH/U0v+P+kct/f+kf9TS/8/6Ry39/6J/1NL/r/pHLf230D9q6f83/aOW/n/XP2rp/w/9o5b+W+oftfTfSv+opf/W+kct/bfRP2rpv63+UUv/7fSPWvpvr3/U0n8H/aOW/jvqH7X030n/qKX/zvpHLf130T9q6b+r/lFL/930j1r6765/1NJ/D/2jlv576h+19N9L/6il/976Ry3999E/aum/r/5RS//99I9a+u+vf9TS/wD9o5b+B+oftfQ/SP+opf/B+kct/Q/RP2rpf6j+UUv/w/SPWvofrn/U0v8I/aOW/kfqH7X0P0r/qKX/0fpHLf2P0T9q6X+s/lFL/+P0j1r6H69/1NL/BP2jlv4n6h+19D9J/6il/8n6Ry39T9E/aul/qv5RS//T9I9a+p+uf9TS/wz9o5b+Z+oftfQ/S/+opf/Z+kct/c/RP2rpf67+UUv/8/SPWvqfr3/U0v8C/aOW/hfqH7X0v0j/qKX/xfpHLf0v0T9q6X+p/lFL/8v0j1r6X65/1NL/Cv2jlv5X6h+19L9K/6il/9X6Ry39r9E/aul/rf5RS//r9I9a+l+vf9TS/wb9o5b+N+oftfS/Sf+opf/N+kct/W/RP2rpf6v+UUv/2/SPWvrfrn/U0v8O/aOW/nfqH7X0v0v/qKX/3fpHLf3v0T9q6X+v/lFL//v0j1r6369/1NL/Af2jlv4P6h+19H9I/6il/8P6Ry39H9E/aun/qP5RS//H9I9a+j+uf9TS/wn9o5b+T+oftfR/Sv+opf/T+kct/Z/RP2rp/6z+UUv/5/SPWvo/r3/U0v8F/aOW/i/qH7X0f0n/qKX/y/pHLf1f0T9q6f+q/lFL/9f0j1r6v65/1NL/Df2jlv5v6h+19H9L/6ik/+gD+kct/QfpH7X0H6x/1NJ/JP2jlv4j6x+19B+if9TSfxT9o5b+o+oftfQfTf+opf/o+kct/cfQP2rpP6b+UUv/T+gftfT/pP5RS/9P6R+19B9L/6il/9j6Ry39P61/1NJ/HP2jlv6f0T9q6T+u/lFL/8/qH7X0/5z+UUv/z+sftfQfT/+opf/4+kct/SfQP2rpP6H+UUv/L+gftfT/ov5RS/8v6R+19P+y/lFL/4n0j1r6T6x/1NJ/Ev2jlv6T6h+19J9M/6il/+T6Ry39p9A/auk/pf5RS/+p9I9a+n9F/6il/1f1j1r6f03/qKX/1/WPWvpPrX/U0n8a/aOW/tPqH7X0n07/qKX/9PpHLf1n0D9q6T+j/lFL/5n0j1r6z6x/1NJ/Fv2jlv6z6h+19J9N/6il/+z6Ry3959A/auk/p/5RS/+59I9a+n9D/6il/zf1j1r6z61/1NJ/Hv2jlv5D9Y9a+g/TP2rpP6/+UUv/b+kftfSfT/+opf/8+kct/RfQP2rpv6D+UUv/hfSPWvovrH/U0n8R/aOW/ovqH7X0/7b+UUv/xfSPWvp/R/+opf939Y9a+n9P/6il/+L6Ry39l9A/aum/pP5RS/+l9I9a+n9f/6il/w/0j1r6L61/1NL/h/pHLf1/pH/U0v/H+kct/X+if9TS/6f6Ry39l9E/aun/M/2jlv7L6h+19F9O/6il//L6Ry39V9A/aum/ov5RS/+V9I9a+q+sf9TSfxX9o5b+q+oftfRfTf+opf/P9Y9a+v9C/6il/+r6Ry3919A/aum/pv5RS/+19I9a+q+tf9TS/5f6Ry3919E/aum/rv5RS//19I9a+v9K/6il/6/1j1r6/0b/qKX/+vpHLf030D9q6b+h/lFL/430j1r6b6x/1NL/t/pHLf030T9q6b+p/lFL/830j1r6b65/1NL/d/pHLf1/r3/U0v8P+kct/f+of9TS/0/6Ry39/6x/1NL/L/pHLf3/qn/U0n8L/aOW/n/TP2rp/3f9o5b+/9A/aum/pf5RS/+t9I9a+m+tf9TSfxv9o5b+2+oftfTfTv+opf/2+kct/XfQP2rpv6P+UUv/nfSPWvrvrH/U0n8X/aOW/rvqH7X0303/qKX/7vpHLf330D9q6b+n/lFL/730j1r6761/1NJ/H/2jlv776h+19N9P/6il//76Ry39D9A/aul/oP5RS/+D9I9a+h+sf9TS/xD9o5b+h+oftfQ/TP+opf/h+kct/Y/QP2rpf6T+UUv/o/SPWvofrX/U0v8Y/aOW/sfqH7X0P07/qKX/8fpHLf1P0D9q6X+i/lFL/5P0j1r6n6x/1NL/FP2jlv6n6h+19D9N/6il/+n6Ry39z9A/aul/pv5RS/+z9I9a+p+tf9TS/xz9o5b+5+oftfQ/T/+opf/5+kct/S/QP2rpf6H+UUv/i/SPWvpfrH/U0v8S/aOW/pfqH7X0v0z/qKX/5fpHLf2v0D9q6X+l/lFL/6v0j1r6X61/1NL/Gv2jlv7X6h+19L9O/6il//X6Ry39b9A/aul/o/5RS/+b9I9a+t+sf9TS/xb9o5b+t+oftfS/Tf+opf/t+kct/e/QP2rpf6f+UUv/u/SPWvrfrX/U0v8e/aOW/vfqH7X0v0//qKX//fpHLf0f0D9q6f+g/lFL/4f0j1r6P6x/1NL/Ef2jlv6P6h+19H9M/6il/+P6Ry39n9A/aun/pP5RS/+n9I9a+j+tf9TS/xn9o5b+z+oftfR/Tv+opf/z+kct/V/QP2rp/6L+UUv/l/SPWvq/rH/U0v8V/aOW/q/qH7X0f03/qKX/6/pHLf3f0D9q6f+m/lFL/7f0j0r6jzGgf9TSf5D+UUv/wfpHLf1H0j9q6T+y/lFL/yH6Ry39R9E/auk/qv5RS//R9I9a+o+uf9TSfwz9o5b+Y+oftfT/hP5RS/9P6h+19P+U/lFL/7H0j1r6j61/1NL/0/pHLf3H0T9q6f8Z/aOW/uPqH7X0/6z+UUv/z+kftfT/vP5RS//x9I9a+o+vf9TSfwL9o5b+E+oftfT/gv5RS/8v6h+19P+S/lFL/y/rH7X0n0j/qKX/xPpHLf0n0T9q6T+p/lFL/8n0j1r6T65/1NJ/Cv2jlv5T6h+19J9K/6il/1f0j1r6f1X/qKX/1/SPWvp/Xf+opf/U+kct/afRP2rpP63+UUv/6fSPWvpPr3/U0n8G/aOW/jPqH7X0n0n/qKX/zPpHLf1n0T9q6T+r/lFL/9n0j1r6z65/1NJ/Dv2jlv5z6h+19J9L/6il/zf0j1r6f1P/qKX/3PpHLf3n0T9q6T9U/6il/zD9o5b+8+oftfT/lv5RS//59I9a+s+vf9TSfwH9o5b+C+oftfRfSP+opf/C+kct/RfRP2rpv6j+UUv/b+sftfRfTP+opf939I9a+n9X/6il//f0j1r6L65/1NJ/Cf2jlv5L6h+19F9K/6il//f1j1r6/0D/qKX/0vpHLf1/qH/U0v9H+kct/X+sf9TS/yf6Ry39f6p/1NJ/Gf2jlv4/0z9q6b+s/lFL/+X0j1r6L69/1NJ/Bf2jlv4r6h+19F9J/6il/8r6Ry39V9E/aum/qv5RS//V9I9a+v9c/6il/y/0j1r6r65/1NJ/Df2jlv5r6h+19F9L/6il/9r6Ry39f6l/1NJ/Hf2jlv7r6h+19F9P/6il/6/0j1r6/1r/qKX/b/SPWvqvr3/U0n8D/aOW/hvqH7X030j/qKX/xvpHLf1/q3/U0n8T/aOW/pvqH7X030z/qKX/5vpHLf1/p3/U0v/3+kct/f+gf9TS/4/6Ry39/6R/1NL/z/pHLf3/on/U0v+v+kct/bfQP2rp/zf9o5b+f9c/aun/D/2jlv5b6h+19N9K/6il/9b6Ry39t9E/aum/rf5RS//t9I9a+m+vf9TSfwf9o5b+O+oftfTfSf+opf/O+kct/XfRP2rpv6v+UUv/3fSPWvrvrn/U0n8P/aOW/nvqH7X030v/qKX/3vpHLf330T9q6b+v/lFL//30j1r6769/1NL/AP2jlv4H6h+19D9I/6il/8H6Ry39D9E/aul/qP5RS//D9I9a+h+uf9TS/wj9o5b+R+oftfQ/Sv+opf/R+kct/Y/RP2rpf6z+UUv/4/SPWvofr3/U0v8E/aOW/ifqH7X0P0n/qKX/yfpHLf1P0T9q6X+q/lFL/9P0j1r6n65/1NL/DP2jlv5n6h+19D9L/6il/9n6Ry39z9E/aul/rv5RS//z9I9a+p+vf9TS/wL9o5b+F+oftfS/SP+opf/F+kct/S/RP2rpf6n+UUv/y/SPWvpfrn/U0v8K/aOW/lfqH7X0v0r/qKX/1fpHLf2v0T9q6X+t/lFL/+v0j1r6X69/1NL/Bv2jlv436h+19L9J/6il/836Ry39b9E/aul/q/5RS//b9I9a+t+uf9TS/w79o5b+d+oftfS/S/+opf/d+kct/e/RP2rpf6/+UUv/+/SPWvrfr3/U0v8B/aOW/g/qH7X0f0j/qKX/w/pHLf0f0T9q6f+o/lFL/8f0j1r6P65/1NL/Cf2jlv5P6h+19H9K/6il/9P6Ry39n9E/aun/rP5RS//n9I9a+j+vf9TS/wX9o5b+L+oftfR/Sf+opf/L+kct/V/RP2rp/6r+UUv/1/SPWvq/rn/U0v8N/aOW/m/qH7X0f0v/qKT/mAP6Ry39B+kftfQfrH/U0n8k/aOW/iPrH7X0H6J/1NJ/FP2jlv6j6h+19B9N/6il/+j6Ry39x9A/auk/pv5RS/9P6B+19P+k/lFL/0/pH7X0H0v/qKX/2PpHLf0/rX/U0n8c/aOW/p/RP2rpP67+UUv/z+oftfT/nP5RS//P6x+19B9P/6il//j6Ry39J9A/auk/of5RS/8v6B+19P+i/lFL/y/pH7X0/7L+UUv/ifSPWvpPrH/U0n8S/aOW/pPqH7X0n0z/qKX/5PpHLf2n0D9q6T+l/lFL/6n0j1r6f0X/qKX/V/WPWvp/Tf+opf/X9Y9a+k+tf9TSfxr9o5b+0+oftfSfTv+opf/0+kct/WfQP2rpP6P+UUv/mfSPWvrPrH/U0n8W/aOW/rPqH7X0n03/qKX/7PpHLf3n0D9q6T+n/lFL/7n0j1r6f0P/qKX/N/WPWvrPrX/0H9cfAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA/4cdOBAAAAAAAPJ/bYSqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqoq7MCBAAAAAACQ/2sjVFVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVWEHDgQAAAAAgPxfG6GqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqoKO3AsAAAAACDM3zqNjg0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCtAAAA//96f2hv") lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000380)=ANY=[], 0x98, 0x0) setxattr$incfs_metadata(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000800), &(0x7f0000000240)="6a80d5e1dcf1ade80445074bb34b2fc5309000f590ece2f48b3f69ba5f42b8f4f8027aa4bdf52746c86663f36cd6b0c74f82a1b9a728cb83324998d93c721bb5847f60bfc923125748446e1b7ba3fb90074919e79f1e15939718e70d748b3686dd59dc3bb13c4ce5d9810462f5d44d919bb0b1f6fd845742a825a7c931f9cb3964edbd792bae628564e9ce0036a29e9a206eabf358c34e50c266479758d6ff8b59dc5004f19679fe5bb532a51bb0fd5e534beae33b939ae21800e8156c7d9b466d9e2304f4844e1bdfb9a5206533a3a25befef3dfb534a2c744f62eeae095ef553bf936927cb354e552d1e495c740aeaa93a892e35415621", 0xf8, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000840)={0x0, 0xfb, 0x16d, 0x0, 0x0, "c5cf280487fe6cd1659c73ae74f1b0df", "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"}, 0x16d, 0x0) 15:02:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2206.111701][ T5032] XFS (loop4): Unmounting Filesystem 5e6273b8-2167-42bb-911b-418aa14a1261 15:02:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:02:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:02:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:02:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:02:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2206.953430][ T27] audit: type=1804 audit(1684076580.298:433): pid=15450 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2222/cgroup.controllers" dev="sda1" ino=1969 res=1 errno=0 [ 2207.140662][ T27] audit: type=1804 audit(1684076580.488:434): pid=15488 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2157/cgroup.controllers" dev="sda1" ino=1961 res=1 errno=0 [ 2207.770517][T15493] loop4: detected capacity change from 0 to 65536 [ 2207.782997][T15493] XFS (loop4): Mounting V4 Filesystem 5e6273b8-2167-42bb-911b-418aa14a1261 [ 2207.821915][T15493] XFS (loop4): Ending clean mount [ 2207.827333][T15493] xfs filesystem being mounted at /root/syzkaller-testdir3652176882/syzkaller.2Oreo2/2576/file0 supports timestamps until 2038-01-19 (0x7fffffff) 15:03:01 executing program 4: syz_mount_image$xfs(&(0x7f000000bb00), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000019c0)=ANY=[@ANYBLOB="001cf57093eea3e8e5ef0b5f29b50d927055d2dcc21347b41fcc36fea222a8f1de8cda11bccaee4a723c13889e055381fc820fb2c0d5db745bd8835ccb442c579a6da928d9c09a24fa04553db8235250d35b4436"], 0x1, 0xbaed, &(0x7f00000176c0)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000380)=ANY=[], 0x98, 0x0) setxattr$incfs_metadata(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000800), &(0x7f0000000240)="6a80d5e1dcf1ade80445074bb34b2fc5309000f590ece2f48b3f69ba5f42b8f4f8027aa4bdf52746c86663f36cd6b0c74f82a1b9a728cb83324998d93c721bb5847f60bfc923125748446e1b7ba3fb90074919e79f1e15939718e70d748b3686dd59dc3bb13c4ce5d9810462f5d44d919bb0b1f6fd845742a825a7c931f9cb3964edbd792bae628564e9ce0036a29e9a206eabf358c34e50c266479758d6ff8b59dc5004f19679fe5bb532a51bb0fd5e534beae33b939ae21800e8156c7d9b466d9e2304f4844e1bdfb9a5206533a3a25befef3dfb534a2c744f62eeae095ef553bf936927cb354e552d1e495c740aeaa93a892e35415621", 0xf8, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000840)={0x0, 0xfb, 0x16d, 0x0, 0x0, "c5cf280487fe6cd1659c73ae74f1b0df", "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"}, 0x16d, 0x0) 15:03:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2207.902838][ T5032] XFS (loop4): Unmounting Filesystem 5e6273b8-2167-42bb-911b-418aa14a1261 15:03:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae7", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae7", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2208.034236][ T27] audit: type=1804 audit(1684076581.378:435): pid=15509 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2158/cgroup.controllers" dev="sda1" ino=1970 res=1 errno=0 15:03:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae7", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2208.346366][ T27] audit: type=1804 audit(1684076581.698:436): pid=15526 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2159/cgroup.controllers" dev="sda1" ino=1961 res=1 errno=0 [ 2208.573327][ T27] audit: type=1804 audit(1684076581.918:437): pid=15540 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2160/cgroup.controllers" dev="sda1" ino=1958 res=1 errno=0 [ 2209.308517][T15547] loop4: detected capacity change from 0 to 65536 [ 2209.319842][T15547] XFS (loop4): Mounting V4 Filesystem 5e6273b8-2167-42bb-911b-418aa14a1261 [ 2209.350417][T15547] XFS (loop4): Ending clean mount [ 2209.356900][T15547] xfs filesystem being mounted at /root/syzkaller-testdir3652176882/syzkaller.2Oreo2/2577/file0 supports timestamps until 2038-01-19 (0x7fffffff) 15:03:02 executing program 4: syz_mount_image$xfs(&(0x7f000000bb00), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000019c0)=ANY=[@ANYBLOB="001cf57093eea3e8e5ef0b5f29b50d927055d2dcc21347b41fcc36fea222a8f1de8cda11bccaee4a723c13889e055381fc820fb2c0d5db745bd8835ccb442c579a6da928d9c09a24fa04553db8235250d35b4436"], 0x1, 0xbaed, &(0x7f00000176c0)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000380)=ANY=[], 0x98, 0x0) setxattr$incfs_metadata(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000800), &(0x7f0000000240)="6a80d5e1dcf1ade80445074bb34b2fc5309000f590ece2f48b3f69ba5f42b8f4f8027aa4bdf52746c86663f36cd6b0c74f82a1b9a728cb83324998d93c721bb5847f60bfc923125748446e1b7ba3fb90074919e79f1e15939718e70d748b3686dd59dc3bb13c4ce5d9810462f5d44d919bb0b1f6fd845742a825a7c931f9cb3964edbd792bae628564e9ce0036a29e9a206eabf358c34e50c266479758d6ff8b59dc5004f19679fe5bb532a51bb0fd5e534beae33b939ae21800e8156c7d9b466d9e2304f4844e1bdfb9a5206533a3a25befef3dfb534a2c744f62eeae095ef553bf936927cb354e552d1e495c740aeaa93a892e35415621", 0xf8, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000840)={0x0, 0xfb, 0x16d, 0x0, 0x0, "c5cf280487fe6cd1659c73ae74f1b0df", "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"}, 0x16d, 0x0) 15:03:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2209.412537][T15547] syz-executor.4 (15547) used greatest stack depth: 18424 bytes left 15:03:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2209.488140][ T5032] XFS (loop4): Unmounting Filesystem 5e6273b8-2167-42bb-911b-418aa14a1261 15:03:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2209.578379][ T27] audit: type=1804 audit(1684076582.928:438): pid=15566 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2161/cgroup.controllers" dev="sda1" ino=1956 res=1 errno=0 15:03:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2209.904728][ T27] audit: type=1804 audit(1684076583.248:439): pid=15583 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2162/cgroup.controllers" dev="sda1" ino=1946 res=1 errno=0 [ 2210.785880][T15598] loop4: detected capacity change from 0 to 65536 [ 2210.796583][T15598] XFS (loop4): Mounting V4 Filesystem 5e6273b8-2167-42bb-911b-418aa14a1261 15:03:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {0x0}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2210.842428][T15598] XFS (loop4): Ending clean mount [ 2210.847953][T15598] xfs filesystem being mounted at /root/syzkaller-testdir3652176882/syzkaller.2Oreo2/2578/file0 supports timestamps until 2038-01-19 (0x7fffffff) 15:03:04 executing program 4: syz_io_uring_setup(0x12d2, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x677c, &(0x7f00000003c0)={0x0, 0x0, 0x4}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) pipe2$watch_queue(0x0, 0x80) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, 0x0) 15:03:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2210.978521][ T5032] XFS (loop4): Unmounting Filesystem 5e6273b8-2167-42bb-911b-418aa14a1261 [ 2211.010034][ T27] audit: type=1804 audit(1684076584.358:440): pid=15621 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2163/cgroup.controllers" dev="sda1" ino=1961 res=1 errno=0 15:03:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2211.178558][ T27] audit: type=1804 audit(1684076584.478:441): pid=15619 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2226/cgroup.controllers" dev="sda1" ino=1970 res=1 errno=0 15:03:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2211.348568][ T27] audit: type=1804 audit(1684076584.698:442): pid=15632 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2164/cgroup.controllers" dev="sda1" ino=1957 res=1 errno=0 15:03:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {0x0}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000d80)={&(0x7f0000000880), 0xc, &(0x7f0000000d40)={&(0x7f00000009c0)={0x12c, 0x0, 0x0, 0x0, 0x0, {}, [{{0x8}, {0x88, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x9a, 0x1, @notify_peers_interval}]}}]}, 0xfffffffffffffe31}}, 0x0) 15:03:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:05 executing program 4: statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x200, &(0x7f0000000040)) r0 = syz_io_uring_setup(0x12d2, &(0x7f0000000140)={0x0, 0xc55e, 0x0, 0x2, 0x6c}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) syz_io_uring_setup(0xfffffff8, &(0x7f0000000240)={0x0, 0x0, 0x10, 0x1, 0x55}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000300)=0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000380)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x31, 0x0, 0xffffffffffffffff, &(0x7f0000000340)={0x90000000}, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x400) syz_io_uring_setup(0x0, &(0x7f00000003c0)={0x0, 0x2e10, 0x4, 0x3, 0x30b}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000440), &(0x7f0000000480)=0x0) syz_io_uring_submit(r2, r4, &(0x7f00000004c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x22, 0x2000, @fd=r0, 0x3, 0x0, 0x0, 0xc, 0x1, {0x1}}, 0x0) pipe2$watch_queue(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_io_uring_setup(0xcc6, &(0x7f0000000680)={0x0, 0x757f, 0x848, 0x0, 0x2d7}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000700), &(0x7f0000000740)) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000900)={'syzkaller0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r6, &(0x7f0000000d80)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000d40)={&(0x7f00000009c0)={0x314, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [{{0x8}, {0x100, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x83}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}]}, 0x314}, 0x1, 0x0, 0x0, 0x4000}, 0x0) syz_clone(0x0, &(0x7f0000000dc0)="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", 0xf00, &(0x7f0000001dc0), 0x0, &(0x7f0000001e40)="77de9f6a4dcaca9f00edc1e9b8c9e180ee0e78ddd49e024d1efa3610b6ed5c37cf2f0893") socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$ndb(&(0x7f0000001f00), 0x0, 0x80400) syz_io_uring_submit(r1, 0x0, &(0x7f0000001f40)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x30, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x0) 15:03:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="58020010000000000000", @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2212.132021][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 2212.132045][ T27] audit: type=1804 audit(1684076585.478:447): pid=15670 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2229/cgroup.controllers" dev="sda1" ino=1958 res=1 errno=0 15:03:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:05 executing program 4: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, 0x0, 0x0) [ 2212.250465][ T27] audit: type=1804 audit(1684076585.598:448): pid=15677 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2167/cgroup.controllers" dev="sda1" ino=1971 res=1 errno=0 [ 2212.411153][ T27] audit: type=1804 audit(1684076585.758:449): pid=15693 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2230/cgroup.controllers" dev="sda1" ino=1962 res=1 errno=0 15:03:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {0x0}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:06 executing program 4: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(r1, &(0x7f00000004c0)={&(0x7f0000000400), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_TX_POWER={0x8}]}, 0x1c}}, 0x0) 15:03:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="58020010000000000000", @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:06 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) pipe2$watch_queue(0x0, 0x80) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)) [ 2212.850072][ T27] audit: type=1804 audit(1684076586.198:450): pid=15700 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2231/cgroup.controllers" dev="sda1" ino=1956 res=1 errno=0 15:03:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2212.922046][ T27] audit: type=1804 audit(1684076586.228:451): pid=15701 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2168/cgroup.controllers" dev="sda1" ino=1967 res=1 errno=0 15:03:06 executing program 4: pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x0) syz_clone3(&(0x7f00000002c0)={0x200000080, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 15:03:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080), 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:06 executing program 4: syz_clone3(&(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0x0], 0x1}, 0x58) syz_clone3(&(0x7f0000002a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000029c0)=[0x0], 0x1}, 0x58) 15:03:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="58020010000000000000", @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2213.145004][ T27] audit: type=1804 audit(1684076586.488:452): pid=15721 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2232/cgroup.controllers" dev="sda1" ino=1957 res=1 errno=0 [ 2213.299367][ T27] audit: type=1804 audit(1684076586.598:453): pid=15726 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2169/cgroup.controllers" dev="sda1" ino=1967 res=1 errno=0 15:03:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080), 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000003000)=@buf={0x28, &(0x7f0000002f80)="051e3342a0a3972c04ed98b433d17c9c7646cc7c07db647f0b790a0083eb3bd492557879c8e0417f"}) 15:03:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0", @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000003000)=@buf) 15:03:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080), 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2213.802241][ T27] audit: type=1804 audit(1684076587.148:454): pid=15749 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2233/cgroup.controllers" dev="sda1" ino=1967 res=1 errno=0 15:03:07 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmmsg(r0, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) [ 2213.922719][ T27] audit: type=1804 audit(1684076587.158:455): pid=15755 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2170/cgroup.controllers" dev="sda1" ino=1963 res=1 errno=0 15:03:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0", @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:07 executing program 4: openat$drirender128(0xffffffffffffff9c, &(0x7f0000002780), 0x0, 0x0) [ 2214.066660][ T27] audit: type=1804 audit(1684076587.418:456): pid=15769 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2171/cgroup.controllers" dev="sda1" ino=1956 res=1 errno=0 15:03:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:07 executing program 4: syz_genetlink_get_family_id$nl80211(&(0x7f0000001480), 0xffffffffffffffff) 15:03:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0", @ANYRES32=r6, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:08 executing program 4: syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0/../file0/../file0\x00', 0x0, 0xa0a000, 0x0) 15:03:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:08 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'erspan0\x00'}) 15:03:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb0000", @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x8800) r1 = syz_clone3(&(0x7f0000000140)={0x8048100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_vm_readv(0x0, &(0x7f0000008400)=[{0x0}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000700)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)=ANY=[], 0x20) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000000040), 0x4) open(&(0x7f0000000280)='./file1\x00', 0x0, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0x10132) recvmmsg(r3, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={@private2}) 15:03:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0", 0x18) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000cc0), r1) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000001140)={'syztnl0\x00', &(0x7f00000010c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1}}) 15:03:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb0000", @ANYRES32=r6, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0", 0x18) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080), 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:09 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$SIOCGETVIFCNT(r0, 0x89e0, &(0x7f00000001c0)={0xffffffffffffffff}) 15:03:09 executing program 4: r0 = eventfd(0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) write$eventfd(r0, &(0x7f00000009c0), 0x8) accept(0xffffffffffffffff, 0x0, 0x0) 15:03:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb0000", @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0", 0x18) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f911", 0x6a}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080), 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae7", 0x1c) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb000000", @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae7", 0x1c) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080), 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae7", 0x1c) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb000000", @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:10 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, &(0x7f0000000180), 0x4) 15:03:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2", 0x1e) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2217.160648][ T27] kauditd_printk_skb: 17 callbacks suppressed [ 2217.160665][ T27] audit: type=1804 audit(1684076590.508:474): pid=15926 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2181/cgroup.controllers" dev="sda1" ino=1954 res=1 errno=0 15:03:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f911", 0x6a}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:10 executing program 4: syz_usb_connect$cdc_ecm(0x3, 0x7d, &(0x7f0000000080)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x72, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x0, "83"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x836, 0x100, 0x2}, [@mdlm_detail={0x4, 0x24, 0x13, 0x20}, @mdlm={0x15}, @obex={0x5, 0x24, 0x15, 0x64}, @network_terminal={0x7, 0x24, 0xa, 0x0, 0x7, 0x1}, @mdlm_detail={0x4, 0x24, 0x13, 0x8}, @ncm={0x6, 0x24, 0x1a, 0xec8}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x10, 0x0, 0x6}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x5, 0x1, 0x5}}}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x2, 0x9, 0x7, 0x20, 0x2f}, 0x5, &(0x7f0000000180)={0x5, 0xf, 0x5}, 0x4, [{0x5d, &(0x7f00000001c0)=@string={0x5d, 0x3, "4b3c0b5c64cae46e9c616e2f54a2ad94aa0e14e10f2ebe9384ed082e08780dbd352a8a404199d5ca70781102e65e8f351abb445164734c91c5b18b4e9ec7284f68a9c9bbbd551fe854ebd30499c77b0f6c94ff606b67d24b55e7d4"}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x418}}, {0x3a, &(0x7f0000000280)=@string={0x3a, 0x3, "f87ad21ffacd35fb3138aa48638cba9f7195a42d63a4398e3040fbea2fee36f4751b77da063e5b11362ae8db9cc4d319ad51fc814dcc64f9"}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x41c}}]}) socket$inet_udplite(0x2, 0x2, 0x88) 15:03:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb000000", @ANYRES32=r6, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2", 0x1e) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540), 0x0, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2217.516162][ T27] audit: type=1804 audit(1684076590.868:475): pid=15932 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2242/cgroup.controllers" dev="sda1" ino=1954 res=1 errno=0 15:03:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2", 0x1e) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2217.612880][ T27] audit: type=1804 audit(1684076590.868:476): pid=15935 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2182/cgroup.controllers" dev="sda1" ino=1963 res=1 errno=0 [ 2217.707519][T31828] usb 5-1: new high-speed USB device number 33 using dummy_hcd 15:03:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r6, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2217.753930][ T27] audit: type=1804 audit(1684076591.098:477): pid=15950 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2243/cgroup.controllers" dev="sda1" ino=1954 res=1 errno=0 15:03:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0", 0x18) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2217.806746][ T27] audit: type=1804 audit(1684076591.158:478): pid=15952 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2183/cgroup.controllers" dev="sda1" ino=1963 res=1 errno=0 15:03:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6", 0x1f) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2217.974329][ T27] audit: type=1804 audit(1684076591.318:479): pid=15962 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2244/cgroup.controllers" dev="sda1" ino=1954 res=1 errno=0 15:03:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0", 0x18) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2218.086934][ T27] audit: type=1804 audit(1684076591.428:480): pid=15968 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2184/cgroup.controllers" dev="sda1" ino=1963 res=1 errno=0 [ 2218.215261][T31828] usb 5-1: config 1 interface 0 altsetting 114 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2218.232653][ T27] audit: type=1804 audit(1684076591.578:481): pid=15973 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2245/cgroup.controllers" dev="sda1" ino=1954 res=1 errno=0 15:03:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f911", 0x6a}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2218.262233][T31828] usb 5-1: config 1 interface 0 has no altsetting 0 [ 2218.435535][T31828] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2218.444619][T31828] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2218.453175][T31828] usb 5-1: Product: 竸ῒ췺וּ㠱䢪豣龺镱ⶤꑣ踹䀰᭵㸆ᅛ⨶쒜᧓冭臼챍磻 [ 2218.464172][T31828] usb 5-1: Manufacturer: И [ 2218.469323][T31828] usb 5-1: SerialNumber: М [ 2218.508426][T15931] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 2218.516504][T15931] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 2218.536013][T31828] usb 5-1: bad CDC descriptors [ 2218.739814][T31945] usb 5-1: USB disconnect, device number 33 15:03:12 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$SIOCGETVIFCNT(r0, 0x89e0, &(0x7f00000001c0)) 15:03:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6", 0x1f) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540), 0x0, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r6, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0", 0x18) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff", 0x9f}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:12 executing program 4: syz_usb_connect$cdc_ecm(0x3, 0xbe, &(0x7f0000000080)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xac, 0x1, 0x1, 0x80, 0x0, 0x8, [{{0x9, 0x4, 0x0, 0x72, 0x3, 0x2, 0x6, 0x0, 0xc0, {{0x6, 0x24, 0x6, 0x0, 0x0, "83"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xfffffff8, 0x836, 0x100, 0x2}, [@mdlm_detail={0x5, 0x24, 0x13, 0x20, "85"}, @mdlm={0x15, 0x24, 0x12, 0xac68}, @obex={0x5, 0x24, 0x15, 0x64}, @network_terminal={0x7, 0x24, 0xa, 0x6, 0x7, 0x1, 0x7}, @mdlm_detail={0x44, 0x24, 0x13, 0x8, "6601f6c75d1bc64aad7a1072ab57a44b8f7479c35df408a3582438e1ad5e99e263ed9c07d6194202d6a223acba747b02520ef5506f212bfff9d70bc7b1323a39"}, @ncm={0x6, 0x24, 0x1a, 0xec8}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x10, 0x7b, 0x0, 0x2}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x5, 0x1, 0x5}}}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x2, 0x9, 0x7, 0x20, 0x2f}, 0x5, &(0x7f0000000180)={0x5, 0xf, 0x5}, 0x4, [{0x5d, &(0x7f00000001c0)=@string={0x5d, 0x3, "4b3c0b5c64cae46e9c616e2f54a2ad94aa0e14e10f2ebe9384ed082e08780dbd352a8a404199d5ca70781102e65e8f351abb445164734c91c5b18b4e9ec7284f68a9c9bbbd551fe854ebd30499c77b0f6c94ff606b67d24b55e7d4"}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x418}}, {0x3a, &(0x7f0000000280)=@string={0x3a, 0x3, "f87ad21ffacd35fb3138aa48638cba9f7195a42d63a4398e3040fbea2fee36f4751b77da063e5b11362ae8db9cc4d319ad51fc814dcc64f9"}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x41c}}]}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000a40)) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) 15:03:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae7", 0x1c) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2219.389939][ T27] audit: type=1804 audit(1684076592.738:482): pid=15993 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2246/cgroup.controllers" dev="sda1" ino=1969 res=1 errno=0 15:03:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6", 0x1f) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2219.508981][ T27] audit: type=1804 audit(1684076592.778:483): pid=15989 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2185/cgroup.controllers" dev="sda1" ino=1971 res=1 errno=0 15:03:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r6, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae7", 0x1c) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2219.749985][T30450] usb 5-1: new high-speed USB device number 34 using dummy_hcd 15:03:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae7", 0x1c) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540), 0x0, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r6, @ANYBLOB="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"], 0x258}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2", 0x1e) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2220.205642][T30450] usb 5-1: config 1 interface 0 altsetting 114 bulk endpoint 0x82 has invalid maxpacket 16 [ 2220.230936][T30450] usb 5-1: config 1 interface 0 altsetting 114 bulk endpoint 0x3 has invalid maxpacket 8 [ 2220.263785][T30450] usb 5-1: config 1 interface 0 altsetting 114 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 2220.315774][T30450] usb 5-1: config 1 interface 0 has no altsetting 0 [ 2220.507773][T30450] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2220.517741][T30450] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2220.526113][T30450] usb 5-1: Product: 竸ῒ췺וּ㠱䢪豣龺镱ⶤꑣ踹䀰᭵㸆ᅛ⨶쒜᧓冭臼챍磻 [ 2220.537080][T30450] usb 5-1: Manufacturer: И [ 2220.541608][T30450] usb 5-1: SerialNumber: М [ 2220.566138][T15999] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 2220.573385][T15999] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 2220.865652][T30450] usb 5-1: bad CDC descriptors [ 2220.879913][T30450] usb 5-1: USB disconnect, device number 34 15:03:14 executing program 4: sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, 0x0, 0x0) 15:03:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff", 0x9f}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2", 0x1e) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r6}) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r6, @ANYBLOB="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"], 0x258}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a0020000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf2502000000340001800800030003000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300010000000800030003000000040001806400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e3000000000000008000300020000001400020076657468315f746f5f7465616d0000001400020070696d726567310000000000000000001400020076657468305f746f5f627269646765004400018008000300020000000800030002000000140002006e69637666300000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000054000180140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020069705f76746930000000000000000000080003000200000028000180080003000100000014000200766c616e3000000000000000000000000800030002000000300001801400020076657468315f6d61637674617000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300030000002000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265746170300000000000000000005400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020064766d7270310000000000000000000008000300020000001400020076657468315f746f5f68737200000000080003000300000038000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626f6e64000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="074dd4d6998346e30900000000000000095b", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003000000000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f30000014000200776c616e3100"/40], 0x2a0}, 0x1, 0x0, 0x0, 0x1}, 0x880) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r8}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r1, 0x821, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000500)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5, 0x7, 0x3}]}]}, 0x28}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000940), 0xffffffffffffffff) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000007c0), r0) socket$nl_generic(0x10, 0x3, 0x10) 15:03:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2", 0x1e) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r1, 0x821, 0x0, 0x0, {{0x1a}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 2221.636833][ T1217] ieee802154 phy0 wpan0: encryption failed: -22 [ 2221.643899][ T1217] ieee802154 phy1 wpan1: encryption failed: -22 15:03:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}], 0x5, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6", 0x1f) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff", 0x9f}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r1, 0x821, 0x0, 0x0, {{}, {@val={0x8, 0xb}, @void}}}, 0x1c}}, 0x0) 15:03:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:15 executing program 4: clock_gettime(0xb, &(0x7f0000000140)) [ 2222.310700][ T27] kauditd_printk_skb: 11 callbacks suppressed [ 2222.310718][ T27] audit: type=1804 audit(1684076595.658:495): pid=16103 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2253/cgroup.controllers" dev="sda1" ino=1964 res=1 errno=0 15:03:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6", 0x1f) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:15 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0x40086607, &(0x7f0000000080)) [ 2222.400378][ T27] audit: type=1804 audit(1684076595.698:496): pid=16106 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2191/cgroup.controllers" dev="sda1" ino=1951 res=1 errno=0 15:03:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}], 0x5, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6", 0x1f) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2222.798968][ T27] audit: type=1804 audit(1684076596.148:497): pid=16122 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2254/cgroup.controllers" dev="sda1" ino=1967 res=1 errno=0 [ 2222.883713][ T27] audit: type=1804 audit(1684076596.228:498): pid=16121 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2192/cgroup.controllers" dev="sda1" ino=1946 res=1 errno=0 15:03:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2223.028332][ T27] audit: type=1804 audit(1684076596.378:499): pid=16132 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2255/cgroup.controllers" dev="sda1" ino=1973 res=1 errno=0 15:03:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd5", 0xb9}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2223.270321][ T27] audit: type=1804 audit(1684076596.618:500): pid=16140 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2256/cgroup.controllers" dev="sda1" ino=1954 res=1 errno=0 15:03:16 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f0000000440), 0xffffffffffffffff) [ 2223.378794][ T27] audit: type=1804 audit(1684076596.698:501): pid=16149 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2193/cgroup.controllers" dev="sda1" ino=1948 res=1 errno=0 [ 2223.513789][ T27] audit: type=1804 audit(1684076596.848:502): pid=16155 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2257/cgroup.controllers" dev="sda1" ino=1954 res=1 errno=0 15:03:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:16 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000001980)={0x14, 0x14, 0x1}, 0x14}}, 0x0) 15:03:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}], 0x5, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000bc0), 0x4) [ 2223.753903][ T27] audit: type=1804 audit(1684076597.098:503): pid=16163 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2258/cgroup.controllers" dev="sda1" ino=1954 res=1 errno=0 15:03:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2223.890986][ T27] audit: type=1804 audit(1684076597.238:504): pid=16173 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2194/cgroup.controllers" dev="sda1" ino=1970 res=1 errno=0 15:03:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd5", 0xb9}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0xfffffffd, 0x4) 15:03:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) 15:03:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:17 executing program 4: io_setup(0x5, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 15:03:17 executing program 4: gettid() syz_clone(0x42000000, &(0x7f0000005600), 0x0, 0x0, &(0x7f00000056c0), &(0x7f0000005700)="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") syz_clone(0x2060080, &(0x7f0000006780)="ec99de8d30dd32425ac807b95b9c26a1f1c15270aae7b4625c15a5dddcf51e87529e92850c5e59cc6f27a9cf30559c0678855fd449d5aeeb6f5852e51be1c0360cd23dc351d901b601e85d486ff12a0562d25cf43f58ee8c561a174e7ac0c87532b47ef8ca999f3dd6594018f1df62b4333ac5bc57b7c31651d3fccc3a151f3a1c547c654354ddd9fa0b89fcfa9dffda85c8221362239290d74f122e0735af9e26486e", 0xa3, &(0x7f0000006840), &(0x7f0000006880), &(0x7f00000068c0)="ec8926a435") 15:03:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {0x0}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:18 executing program 4: gettid() syz_clone(0x42000000, &(0x7f0000005600), 0x0, 0x0, &(0x7f00000056c0), &(0x7f0000005700)="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") syz_clone(0x2060080, &(0x7f0000006780)="ec99de8d30dd32425ac807b95b9c26a1f1c15270aae7b4625c15a5dddcf51e87529e92850c5e59cc6f27a9cf30559c0678855fd449d5aeeb6f5852e51be1c0360cd23dc351d901b601e85d486ff12a0562d25cf43f58ee8c561a174e7ac0c87532b47ef8ca999f3dd6594018f1df62b4333ac5bc57b7c31651d3fccc3a151f3a1c547c654354ddd9fa0b89fcfa9dffda85c8221362239290d74f122e0735af9e26486e", 0xa3, &(0x7f0000006840), &(0x7f0000006880), &(0x7f00000068c0)="ec8926a435") 15:03:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540), 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd5", 0xb9}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540), 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:18 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/meminfo\x00', 0x0, 0x0) 15:03:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 15:03:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {0x0}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540), 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71", 0xc6}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c", 0x21}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:19 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001680)) 15:03:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:20 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0xc0045878, 0x0) 15:03:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {0x0}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:20 executing program 4: io_cancel(0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 15:03:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) socket(0x0, 0x0, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0xde00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 15:03:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71", 0xc6}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:20 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0xc020660b, 0x0) [ 2227.358829][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 2227.358847][ T27] audit: type=1804 audit(1684076600.708:514): pid=16336 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2200/cgroup.controllers" dev="sda1" ino=1971 res=1 errno=0 15:03:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:20 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={0x0}}, 0x0) 15:03:21 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={{0x30}, {0x858, 0x40, 0x1, 0x1}}, @common=@ttl={{0x28}, {0x0, 0x3e}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x5, 0x4, 0x2, 0x2, 0x5, 0x1], 0x6, 0x1}, {0x3, [0x7, 0x2, 0x1, 0x1, 0x8, 0x1], 0x5, 0x5}}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) 15:03:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:21 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, &(0x7f0000000bc0)={'erspan0\x00', 0x0}) [ 2227.769485][T16352] x_tables: duplicate underflow at hook 3 15:03:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71", 0xc6}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:21 executing program 4: syz_open_dev$hidraw(&(0x7f0000000880), 0x0, 0x0) 15:03:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:21 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', 0x0}) 15:03:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2228.300149][ T27] audit: type=1804 audit(1684076601.648:515): pid=16370 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2263/cgroup.controllers" dev="sda1" ino=1946 res=1 errno=0 [ 2228.382411][ T27] audit: type=1804 audit(1684076601.668:516): pid=16371 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2201/cgroup.controllers" dev="sda1" ino=1932 res=1 errno=0 15:03:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x3a, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00'}, 0x10) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000300)={0x0, 'wg0\x00', {0x1}, 0xfff}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0xde00) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r5 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x4004f506, &(0x7f0000000040)) 15:03:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a", 0xcd}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2229.270573][ T27] audit: type=1804 audit(1684076602.618:517): pid=16414 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2202/cgroup.controllers" dev="sda1" ino=1960 res=1 errno=0 [ 2229.376192][ T27] audit: type=1804 audit(1684076602.688:518): pid=16419 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2264/cgroup.controllers" dev="sda1" ino=1965 res=1 errno=0 15:03:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) socket(0x0, 0x0, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0xde00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 15:03:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a", 0xcd}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540), 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000400)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x202}) 15:03:23 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x0, @remote}}}, 0x88) [ 2230.236813][ T27] audit: type=1804 audit(1684076603.588:519): pid=16463 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2203/cgroup.controllers" dev="sda1" ino=1950 res=1 errno=0 [ 2230.321411][ T27] audit: type=1804 audit(1684076603.658:520): pid=16462 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2265/cgroup.controllers" dev="sda1" ino=1968 res=1 errno=0 15:03:23 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000bc0)={'erspan0\x00', 0x0}) 15:03:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff", 0x3}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:23 executing program 4: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$fou(&(0x7f0000001dc0), 0xffffffffffffffff) 15:03:23 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$SIOCGETVIFCNT(r0, 0x89e0, &(0x7f0000001cc0)) 15:03:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)={0x20, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x20}}, 0x0) 15:03:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a", 0xcd}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540), 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:24 executing program 4: socketpair(0x2b, 0x1, 0xcf040000, &(0x7f0000000000)) 15:03:24 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @broadcast, {[@noop]}}}}}) 15:03:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2231.196778][ T27] audit: type=1804 audit(1684076604.548:521): pid=16501 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2204/cgroup.controllers" dev="sda1" ino=1967 res=1 errno=0 15:03:24 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback=0x8d194e1e}}, 0x1c, 0x0}}], 0x1, 0x0) 15:03:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff", 0x3}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2231.361180][ T27] audit: type=1804 audit(1684076604.708:522): pid=16504 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2266/cgroup.controllers" dev="sda1" ino=1955 res=1 errno=0 15:03:24 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@mcast1, @dev, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x20}) 15:03:25 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 15:03:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1", 0xd0}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f00000000c0)="0bbb268dd6ffa80800000000000000000000210d0000aaa8fa010600ba9380d4", 0x20) 15:03:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540), 0x0, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:25 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket(0x40000000015, 0x5, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fedc68ca00e36f13e60000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="1bf8ad2774"], 0x20000600}}, 0x0) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) accept$ax25(r3, 0x0, 0x0) 15:03:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2232.118208][ T27] audit: type=1804 audit(1684076605.468:523): pid=16540 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2205/cgroup.controllers" dev="sda1" ino=1957 res=1 errno=0 15:03:25 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x3, 0x2b, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x2, 0x5}}}}}}}, 0x0) 15:03:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff", 0x3}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:25 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x3, 0x2b, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x2, 0x5}}}}}}}, 0x0) 15:03:25 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x3, 0x2b, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x2, 0x5}}}}}}}, 0x0) 15:03:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:26 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x3, 0x2b, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x2, 0x5}}}}}}}, 0x0) 15:03:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1", 0xd0}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:26 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 15:03:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:26 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 15:03:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:26 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) [ 2233.122582][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 2233.122600][ T27] audit: type=1804 audit(1684076606.468:525): pid=16581 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2206/cgroup.controllers" dev="sda1" ino=1957 res=1 errno=0 15:03:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff28", 0x4}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) [ 2233.331358][ T27] audit: type=1804 audit(1684076606.678:526): pid=16596 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2268/cgroup.controllers" dev="sda1" ino=1955 res=1 errno=0 15:03:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:26 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000140)="8464", 0x2}, {&(0x7f0000000240)="90", 0x1}], 0x2}}], 0x1, 0x0) 15:03:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1", 0xd0}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000e40)={'ip_vti0\x00', &(0x7f0000000d40)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @local}}}}) [ 2233.666609][ T27] audit: type=1804 audit(1684076607.018:527): pid=16607 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2269/cgroup.controllers" dev="sda1" ino=1969 res=1 errno=0 15:03:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:27 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000680)=[{0x0}, {&(0x7f0000000240)="90", 0x1}], 0x2}}], 0x1, 0x0) 15:03:27 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:27 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) [ 2234.080551][ T27] audit: type=1804 audit(1684076607.428:528): pid=16624 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2207/cgroup.controllers" dev="sda1" ino=1957 res=1 errno=0 15:03:27 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff28", 0x4}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:27 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2234.624685][ T27] audit: type=1804 audit(1684076607.968:529): pid=16647 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2270/cgroup.controllers" dev="sda1" ino=1965 res=1 errno=0 15:03:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e", 0xd2}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:28 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:28 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:28 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:28 executing program 4: socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) [ 2234.982919][ T27] audit: type=1804 audit(1684076608.328:530): pid=16667 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2208/cgroup.controllers" dev="sda1" ino=1961 res=1 errno=0 15:03:28 executing program 4: socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6cca2f1302e0221200e2eec11608af18d3b91b7144", 0xa5}, {&(0x7f0000002800)="fd06ff28", 0x4}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:28 executing program 4: socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e", 0xd2}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:29 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) [ 2235.569106][ T27] audit: type=1804 audit(1684076608.918:531): pid=16691 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2271/cgroup.controllers" dev="sda1" ino=1960 res=1 errno=0 15:03:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:29 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 15:03:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:29 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 15:03:29 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) [ 2235.920590][ T27] audit: type=1804 audit(1684076609.268:532): pid=16708 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2209/cgroup.controllers" dev="sda1" ino=1963 res=1 errno=0 15:03:29 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) 15:03:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x5, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:29 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) 15:03:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e", 0xd2}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:29 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) [ 2236.523942][ T27] audit: type=1804 audit(1684076609.868:533): pid=16731 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2272/cgroup.controllers" dev="sda1" ino=1959 res=1 errno=0 15:03:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:30 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:30 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:30 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) [ 2236.852654][ T27] audit: type=1804 audit(1684076610.198:534): pid=16749 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2210/cgroup.controllers" dev="sda1" ino=1961 res=1 errno=0 15:03:30 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x5, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00'}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:30 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='qd', 0x2}, {&(0x7f0000000140)="8464", 0x2}], 0x2}}], 0x2, 0x0) 15:03:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:30 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, 0x0}}], 0x2, 0x0) 15:03:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e333", 0x9}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:30 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, 0x0}}], 0x1, 0x0) 15:03:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00'}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:31 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 15:03:31 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 15:03:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00'}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:31 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 15:03:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x5, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:31 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 15:03:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r2 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r4}) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r4, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r6}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e333", 0x9}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:31 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 15:03:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r2 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r4}) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r4, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r6}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2238.538661][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 2238.538677][ T27] audit: type=1804 audit(1684076611.888:537): pid=16822 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2274/cgroup.controllers" dev="sda1" ino=1952 res=1 errno=0 15:03:31 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 15:03:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @loopback}, @private2, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000200}) [ 2238.758114][ T27] audit: type=1804 audit(1684076612.108:538): pid=16832 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2212/cgroup.controllers" dev="sda1" ino=1966 res=1 errno=0 15:03:32 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fedc68", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="1bf8ad2774"], 0x20000600}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x6, 0x800, 0x5, {0x0, 0x2710}, {0x77359400}, {0x3, 0x1}, 0x1, @canfd={{0x0, 0x0, 0x1}, 0x3b, 0x0, 0x0, 0x0, "6213fc6ee66693e29bf2a43e2495795d4478bc83fe4d5d2d6d2671e3a01811a3f44c6f919062f2fa3790264b6d1d97257f8d10205375c28dc51507c5add4e85c"}}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x4800) [ 2238.964626][ T27] audit: type=1804 audit(1684076612.308:539): pid=16844 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2275/cgroup.controllers" dev="sda1" ino=1971 res=1 errno=0 15:03:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {0x0}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:32 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x140, 0x0) 15:03:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r2 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r4}) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r4, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r6}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:32 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c, 0x0}}], 0x1, 0x0) 15:03:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:32 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c, 0x0}}], 0x1, 0xe00) 15:03:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e333", 0x9}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:32 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000080)='q', 0x1}, {&(0x7f0000000140)="846408e4bab0b0", 0x7}, {&(0x7f0000000240)="90", 0x1}], 0x3}}], 0x2, 0x0) 15:03:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002d40)={&(0x7f0000002b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000002c40)=""/202, 0x26, 0xca, 0x1}, 0x20) [ 2239.690257][ T27] audit: type=1804 audit(1684076613.038:540): pid=16878 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2213/cgroup.controllers" dev="sda1" ino=1966 res=1 errno=0 15:03:33 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) [ 2239.921357][ T27] audit: type=1804 audit(1684076613.268:541): pid=16884 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2276/cgroup.controllers" dev="sda1" ino=1965 res=1 errno=0 15:03:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {0x0}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:33 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@loopback, @private2, @mcast1, 0x0, 0x0, 0x200, 0x0, 0x0, 0x10000c9}) 15:03:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:33 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) 15:03:33 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c, 0x0}}], 0x68000, 0x0) 15:03:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081", 0xd}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2240.328158][ T27] audit: type=1804 audit(1684076613.678:542): pid=16906 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2277/cgroup.controllers" dev="sda1" ino=1957 res=1 errno=0 15:03:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:33 executing program 4: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x4023831, 0xffffffffffffffff, 0x0) [ 2240.554268][ T27] audit: type=1804 audit(1684076613.898:543): pid=16921 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2214/cgroup.controllers" dev="sda1" ino=1945 res=1 errno=0 15:03:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000008ac0)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}, {{&(0x7f0000000200)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000008d40)=ANY=[], 0x28}}], 0x2, 0x0) [ 2240.676622][ T27] audit: type=1804 audit(1684076613.988:544): pid=16918 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2278/cgroup.controllers" dev="sda1" ino=1959 res=1 errno=0 15:03:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {0x0}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r2 = socket(0x200000000000011, 0x4000000000080002, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) [ 2240.885541][ T27] audit: type=1804 audit(1684076614.238:545): pid=16930 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2279/cgroup.controllers" dev="sda1" ino=1957 res=1 errno=0 [ 2240.955058][T16933] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 2240.981338][T16933] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 15:03:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:34 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 15:03:34 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)={&(0x7f0000000a80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x10) 15:03:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081", 0xd}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:34 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x3, 0x21, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x2, 0x5}}}}}}}, 0x0) [ 2241.473985][T16954] dccp_invalid_packet: pskb_may_pull failed 15:03:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x28, 0x2, 0x7, 0x101, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8}]}]}, 0x28}}, 0x0) 15:03:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0xa, &(0x7f0000000040)=0x7, 0x4) [ 2241.558096][ T27] audit: type=1804 audit(1684076614.908:546): pid=16953 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2215/cgroup.controllers" dev="sda1" ino=1965 res=1 errno=0 15:03:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:35 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:03:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:35 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@tclass={{0x14}}], 0x18}}], 0x1, 0x0) 15:03:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081", 0xd}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:35 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000011c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:03:35 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001d40)) 15:03:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:35 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x2, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x3a) 15:03:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x541b, &(0x7f0000000640)={'ip6tnl0\x00', 0x0}) 15:03:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:36 executing program 4: syz_emit_ethernet(0x8e, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x58, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0x2}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2", 0xf}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:36 executing program 4: syz_emit_ethernet(0x8e, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x58, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0x2}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:36 executing program 4: syz_emit_ethernet(0x8e, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x58, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0x2}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:36 executing program 4: syz_emit_ethernet(0x8e, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x58, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0x2}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:37 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 15:03:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:37 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) [ 2243.884749][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 2243.884766][ T27] audit: type=1804 audit(1684076617.228:551): pid=17073 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2282/cgroup.controllers" dev="sda1" ino=1957 res=1 errno=0 15:03:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2", 0xf}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:37 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 15:03:37 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}]}}}}}}}}, 0x0) 15:03:37 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}]}}}}}}}}, 0x0) 15:03:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2244.309876][ T27] audit: type=1804 audit(1684076617.658:552): pid=17095 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2218/cgroup.controllers" dev="sda1" ino=1967 res=1 errno=0 15:03:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516db", 0x19}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:38 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}]}}}}}}}}, 0x0) 15:03:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd", 0x53}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2244.793171][ T27] audit: type=1804 audit(1684076618.138:553): pid=17119 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2283/cgroup.controllers" dev="sda1" ino=1971 res=1 errno=0 15:03:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:38 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:38 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2", 0xf}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:38 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x0, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:38 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:38 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 2245.212359][ T27] audit: type=1804 audit(1684076618.558:554): pid=17137 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2219/cgroup.controllers" dev="sda1" ino=1963 res=1 errno=0 15:03:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516db", 0x19}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:38 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x0, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd", 0x53}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2245.710154][ T27] audit: type=1804 audit(1684076619.058:555): pid=17157 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2284/cgroup.controllers" dev="sda1" ino=1971 res=1 errno=0 15:03:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c5", 0x17}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:39 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x48, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x0, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa", 0x10}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:39 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x48, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:39 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x48, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:39 executing program 4: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0x4}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2246.131255][ T27] audit: type=1804 audit(1684076619.478:556): pid=17180 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2220/cgroup.controllers" dev="sda1" ino=1941 res=1 errno=0 15:03:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516db", 0x19}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:39 executing program 4: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0x4}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa", 0x10}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2246.606352][ T27] audit: type=1804 audit(1684076619.958:557): pid=17206 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2221/cgroup.controllers" dev="sda1" ino=1945 res=1 errno=0 15:03:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c5", 0x17}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd", 0x53}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:40 executing program 4: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0x4}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 2246.679730][ T27] audit: type=1804 audit(1684076620.008:558): pid=17205 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2285/cgroup.controllers" dev="sda1" ino=1963 res=1 errno=0 15:03:40 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0x9, 0xf989, "b7bb0089b2"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa", 0x10}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:40 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0x9, 0xf989, "b7bb0089b2"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:40 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0x9, 0xf989, "b7bb0089b2"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 2247.024015][ T27] audit: type=1804 audit(1684076620.368:559): pid=17231 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2222/cgroup.controllers" dev="sda1" ino=1957 res=1 errno=0 15:03:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329", 0x1d}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:40 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xb, 0xf989, "b7bb0089b290cc"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2247.526812][ T27] audit: type=1804 audit(1684076620.878:560): pid=17248 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2223/cgroup.controllers" dev="sda1" ino=1960 res=1 errno=0 15:03:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c5", 0x17}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:41 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xb, 0xf989, "b7bb0089b290cc"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80", 0x7c}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:41 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xb, 0xf989, "b7bb0089b290cc"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:41 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xc, 0xf989, "b7bb0089b290cc9b"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:41 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xc, 0xf989, "b7bb0089b290cc9b"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329", 0x1d}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:41 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xc, 0xf989, "b7bb0089b290cc9b"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:41 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11", 0x22}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:41 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80", 0x7c}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:42 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:42 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:42 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329", 0x1d}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:42 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2249.422277][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 2249.422295][ T27] audit: type=1804 audit(1684076622.768:565): pid=17330 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2226/cgroup.controllers" dev="sda1" ino=1960 res=1 errno=0 15:03:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11", 0x22}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:42 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x44, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80", 0x7c}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2249.494494][ T27] audit: type=1804 audit(1684076622.818:566): pid=17334 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2288/cgroup.controllers" dev="sda1" ino=1964 res=1 errno=0 15:03:43 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x44, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:43 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x44, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @timestamp={0x8, 0xa}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:43 executing program 4: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 2249.868653][ T27] audit: type=1804 audit(1684076623.218:567): pid=17363 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2227/cgroup.controllers" dev="sda1" ino=1962 res=1 errno=0 15:03:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca", 0x1f}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:43 executing program 4: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2250.320456][ T27] audit: type=1804 audit(1684076623.668:568): pid=17377 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2228/cgroup.controllers" dev="sda1" ino=1957 res=1 errno=0 [ 2250.378190][ T27] audit: type=1804 audit(1684076623.728:569): pid=17376 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2289/cgroup.controllers" dev="sda1" ino=1958 res=1 errno=0 15:03:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11", 0x22}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:43 executing program 4: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c80648afbf423cd8bb2e59c1972f45d4746415ee84a6c", 0x91}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:43 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:44 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:44 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 2250.720643][ T27] audit: type=1804 audit(1684076624.068:570): pid=17394 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2229/cgroup.controllers" dev="sda1" ino=1967 res=1 errno=0 15:03:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca", 0x1f}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:44 executing program 4: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r5}) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r5, @ANYBLOB="f2ff0c00070006000800ffff08000e00ffffffff08000e000c08000007000100727200001800020006000000de05d625de9146aa1ed7fc61fa9eabe306000500007f000008000e00d90b0000dc0008801c000100f73fffff030000000000000003000000000000000800000014000200020005001000080000000000ff7f02001c000100010607000600000000000000050000000200000009000000160002000000c8040900ff0f410c030001014000090000001c0001008000070005000000020000000600000009000000030000000a00020008000000080000001c000100097a4e0b0700000002000000090000004f350000030000000a00020081007707020000001c00010080080001000000000200000001000000040000000100000006000200020000000b00010074617072696f00000c0102000c00080001000000000000000800050002000000080005000700000008000a00060000005600010002030c09030e0009040501050b0f0f0e0a01b8000900030004e10500ff010500010040008100060001000100010006000600030005000700010004000000010083000900000c2d000300050007000000c8a9000080000280340001800500020008000000080003000100008008000400030000000800040060000000080004000200000005000200d6000000340001800800030001000000080004000500000005000200060000000500"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r7}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2251.263089][ T27] audit: type=1804 audit(1684076624.608:571): pid=17423 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2230/cgroup.controllers" dev="sda1" ino=1963 res=1 errno=0 [ 2251.357102][ T27] audit: type=1804 audit(1684076624.658:572): pid=17422 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547230753/syzkaller.eOxZ5g/2290/cgroup.controllers" dev="sda1" ino=1959 res=1 errno=0 15:03:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898", 0x28}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:44 executing program 4: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c8064", 0x7d}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:44 executing program 4: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2df8f2", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "42a735589972e04e113fd7fac854f6be"}, @window={0x3, 0x3}, @eol, @exp_fastopen={0xfe, 0xd, 0xf989, "b7bb0089b290cc9b0f"}, @fastopen={0x22, 0x3, "ba"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 15:03:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r2 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r4}) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r4, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r6}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:03:44 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@tclass={{0x14}}, @dstopts={{0x18}}], 0x30}}], 0x1, 0x0) [ 2251.680490][ T27] audit: type=1804 audit(1684076625.028:573): pid=17438 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2231/cgroup.controllers" dev="sda1" ino=1951 res=1 errno=0 15:03:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r0, &(0x7f0000001940)=[{{&(0x7f0000000140)=@phonet={0x23, 0x0, 0x0, 0x17}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)="512f5d4d3cb42f25b6ddf865fbca", 0xe}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 15:03:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca", 0x1f}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:03:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x25dfdbf9, 0x10}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) bind$netlink(r2, &(0x7f00000002c0)={0x10, 0x0, 0x25dfdbfc, 0x8}, 0xc) write$binfmt_aout(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="0000f8f0b1c3d37a4557aff030c65012ba00"/32], 0x20) getsockname$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r3, @ANYBLOB="0101000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=ANY=[@ANYBLOB="300000002400006bcbb8a02bbf2bc70f00000026fef6f03a00000000c147a11132c5db8d589d7cade835267fa6c8508af48d1d79cac61d7a7c77bbba78f4335fb33a57d418bb5fb3e90ef30c51da0fca9f8f0fd5c5f88a07462e4a20de3adfb4fa7bc3e9231ccbf3c4436dea3024e30000000000000000", @ANYRES32=r3, @ANYBLOB="00000000f1ffffff00000000290905000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="240000002e00fdff000000008000000008000000", @ANYRES32=r3, @ANYBLOB="000000000200ffff00000000"], 0x24}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r6) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r7, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x30, r8, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}]}, 0xfffffffffffffe06}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_KEY(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x14, r8, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x4000) getsockopt$sock_int(r4, 0x1, 0x10, &(0x7f0000000180), &(0x7f0000000300)=0x4) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r9, @ANYBLOB="01000000002200001c0012000c000100626f6e640000"], 0x3c}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) getsockname$packet(r5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r14 = socket(0x1, 0x803, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r16 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r16, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x234}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1e}}]}}}, @IFLA_LINK={0x8, 0x5, r15}]}, 0x50}}, 0x0) sendmsg$nl_route(r10, &(0x7f0000000240)={0x0, 0x4a, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x24, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r12}, @IFLA_HSR_VERSION={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r13}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x60}, 0x1, 0x0, 0x0, 0x2000040}, 0x0) 15:03:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r2 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r4}) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r4, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r6}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2252.098175][T17457] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2252.133202][T17457] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2252.195585][ T27] audit: type=1804 audit(1684076625.548:574): pid=17462 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir289329508/syzkaller.sDkdzf/2232/cgroup.controllers" dev="sda1" ino=1949 res=1 errno=0 15:03:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898", 0x28}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b", 0xd3}], 0x2, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) 15:03:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) 15:03:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a1c11d2929a33c898d229e4cb3e", 0x2d}, {&(0x7f00000002c0)="83e1b1f3901da331b0033412514d3337679de8b19ebcd9eb920b77cfd0e486fd04af046e1a887374d3924571ef58f9d77e145dc9ee626f5a59d5a28b90b669d2752bccda6cc2aa887f50356b4a0b62421fd281553c28b694bb7fff28598fe21ec0e62db510cfa104f9115b4e4e322e527665a849607ea3bf8afbd01bbe9a1838e23607de61b9034a81a46e443e1eb03cefac442e2d0b4882459157bae5a6ff0c9759501b6ce73c208c431b7f4299757e36790f521e85793dd591ae7ecd15fdfabe3e37d22f71e2830a16b8483a30cbc1056e9b1afcd54a643940df8d68637bc8618724470ecc411709bddc81cc10eaacf7f362b1fefa3c", 0xf7}, {&(0x7f00000003c0)="ec93d2c8e1655794a26ca6ebddca7379f7b626775fb1d80785e48c0cb3b38b81bf3b078b1caceb3605fe03bb234ded643adc1a948437d4422ec96d168f0b3ef0bc16af9a1e88dd6fb44de5f85a242ddb5b8ad1012aa92c121975701c814250a39622c6d7aaad4b44baef165d6b34c69e23ad9e382199dc32c8bc15ba938622467b06279ee8462aa6253bf0e90ccc76bb4ea6926c48", 0x95}, {&(0x7f0000001600)="1850bd41ef827432841841c339b6fd7f8ef9a323f03f616efc279e2aef6f7d2c0047f8cc41040658fdae5d9291b0c8b0cbd2543d7b6abfb97d527f1c96d4bfaba608c04091f4cfeefda623ba532854e319872514570a6f8054e364a79e08bb64d211002e3ac96e923807ec0b53f1215689f6d71edea22680fbe17fa1ed2c1f9c0f8c35eb9dd8de0e6a3d2eef8b01bebd4a1926ed412bbe9f28c19a37aa59f10fbee56c0f75b7d295c49fabe91af6bb15088c77de1367f152d3b959da782a80bc9ea0a605c3e4cb097cc0393ebd042270dab6b5dc770b7434460d6c01e8f4", 0xde}, {&(0x7f0000001700)="7af3abe9959a437761b9bca072647e02038c4bdf0a043cd4aa5a79033cc2d0765cd30e940d2f64c6ddfff01c1b99e7ce01c5b48a4df1c5f911b468221e31aab08dac5e75f781b9078801b7633e67c6780d00cd5f52ebf7fd749576892d37dbf61737ff52cdf17593a6c332bdb206ea8b415af7eb1cd22c7a01d31c8064", 0x7d}, {&(0x7f0000002800)="fd06ff284c", 0x5}], 0x6, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) [ 2252.357333][T17466] vlan0: entered promiscuous mode [ 2252.362825][T17466] bond80: entered promiscuous mode [ 2252.380492][T17466] vlan0: entered allmulticast mode [ 2252.416111][T17466] bond80: entered allmulticast mode 15:03:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0x8) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x10000}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x3, 0x0) r2 = socket$inet6(0xa, 0x3, 0x8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}}, 0x1c) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @private0, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301e6, r4}) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f00000000c0)="240000001e005f3814fffffffffffff807000000000009000000000006000500", 0x20) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="580200100000000000007000ffdba0fb00000000", @ANYRES32=r4, @ANYBLOB="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"], 0x258}}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x880) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe53, 0x10, &(0x7f0000000000)={0x0, 0x80000001}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree_skb\x00', r6}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2252.518289][T17473] team0: entered promiscuous mode [ 2252.523651][T17473] team_slave_0: entered promiscuous mode [ 2252.533143][T17473] team_slave_1: entered promiscuous mode [ 2252.541553][T17473] bond1: entered promiscuous mode [ 2252.547490][T17473] bond2: entered promiscuous mode [ 2252.553136][T17473] bond3: entered promiscuous mode [ 2252.559087][T17473] bond4: entered promiscuous mode 15:03:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2252.572892][T17473] bond5: entered promiscuous mode [ 2252.581395][T17473] bond6: entered promiscuous mode [ 2252.595467][T17473] bond7: entered promiscuous mode [ 2252.606967][T17473] bond8: entered promiscuous mode [ 2252.624283][T17473] bond9: entered promiscuous mode [ 2252.638318][T17473] bond10: entered promiscuous mode [ 2252.657246][T17473] bond11: entered promiscuous mode [ 2252.685660][T17473] bond12: entered promiscuous mode [ 2252.692329][T17473] bond13: entered promiscuous mode [ 2252.732865][T17473] bond14: entered promiscuous mode 15:03:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, 0x0, 0x0, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2252.762459][T17473] bond15: entered promiscuous mode [ 2252.788515][T17473] bond16: entered promiscuous mode [ 2252.808082][T17473] bond17: entered promiscuous mode [ 2252.828613][T17473] bond18: entered promiscuous mode [ 2252.841858][T17473] bond19: entered promiscuous mode [ 2252.851034][T17473] bond20: entered promiscuous mode [ 2252.857902][T17473] bond21: entered promiscuous mode [ 2252.863343][T17473] bond22: entered promiscuous mode [ 2252.869822][T17473] bond23: entered promiscuous mode [ 2252.875844][T17473] bond24: entered promiscuous mode [ 2252.881489][T17473] bond25: entered promiscuous mode [ 2252.888415][T17473] bond26: entered promiscuous mode [ 2252.895525][T17473] bond27: entered promiscuous mode [ 2252.901027][T17473] bond28: entered promiscuous mode [ 2252.906791][T17473] bond29: entered promiscuous mode [ 2252.912306][T17473] bond30: entered promiscuous mode [ 2252.918165][T17473] bond31: entered promiscuous mode [ 2252.923632][T17473] bond32: entered promiscuous mode [ 2252.930898][T17473] bond33: entered promiscuous mode [ 2252.942091][T17473] bond34: entered promiscuous mode [ 2252.948937][T17473] bond35: entered promiscuous mode [ 2252.954707][T17473] bond36: entered promiscuous mode [ 2252.961651][T17473] bond49: entered promiscuous mode [ 2252.967290][T17473] bond50: entered promiscuous mode [ 2252.972957][T17473] bond51: entered promiscuous mode [ 2252.979008][T17473] bond56: entered promiscuous mode [ 2252.984526][T17473] bond57: entered promiscuous mode 15:03:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa74", 0x11}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, 0x0, 0x0, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20048000) [ 2252.990178][T17473] bond58: entered promiscuous mode [ 2252.996793][T17473] bond59: entered promiscuous mode [ 2253.002442][T17473] bond60: entered promiscuous mode [ 2253.008209][T17473] bond61: entered promiscuous mode [ 2253.013698][T17473] bond62: entered promiscuous mode [ 2253.019435][T17473] bond63: entered promiscuous mode [ 2253.025003][T17473] bond64: entered promiscuous mode [ 2253.030631][T17473] bond65: entered promiscuous mode [ 2253.036234][T17473] bond66: entered promiscuous mode 15:03:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ed6f03060acd6911cce7527ee2353271dbfed08011bce2f0416d4ae751f2f6fd", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005540)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="3b4190e5c41b90e3335964a081c5b2aa744a38c75326c516dbd37fe329c1ca8a", 0x20}], 0x1, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000005c0)=[{{0x0, 0x60b, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x40000, 0x7000000}}], 0xa900, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x10000a006) sendmsg$alg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2253.042399][T17473] bond67: entered promiscuous mode [ 2253.055983][T17473] bond68: entered promiscuous mode [ 2253.061690][T17473] bond69: entered promiscuous mode [ 2253.071417][T17473] bond70: entered promiscuous mode [ 2253.130588][ C1] BUG: TASK stack guard page was hit at ffffc9000635feb8 (stack is ffffc90006360000..ffffc90006368000) [ 2253.130617][ C1] stack guard page: 0000 [#1] PREEMPT SMP KASAN [ 2253.130635][ C1] CPU: 1 PID: 17473 Comm: syz-executor.4 Not tainted 6.4.0-rc1-syzkaller-00177-gbb7c241fae62 #0 [ 2253.130655][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 2253.130666][ C1] RIP: 0010:validate_chain+0x1f/0x58e0 [ 2253.130703][ C1] Code: 77 00 eb 84 e8 92 16 43 09 66 90 f3 0f 1e fa 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec 80 02 00 00 49 89 ce <89> 54 24 60 48 89 bc 24 80 00 00 00 65 48 8b 04 25 28 00 00 00 48 [ 2253.130719][ C1] RSP: 0018:ffffc9000635fec0 EFLAGS: 00010086 [ 2253.130736][ C1] RAX: 1ffffffff2003fdc RBX: ffffffff9001fee0 RCX: a03d63e6a8cd7ad2 [ 2253.130750][ C1] RDX: 0000000000000000 RSI: ffff888079cce430 RDI: ffff888079ccd940 [ 2253.130764][ C1] RBP: ffffc90006360168 R08: dffffc0000000000 R09: fffffbfff206504d [ 2253.130790][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888079ccd940 [ 2253.130803][ C1] R13: ffff888079ccd940 R14: a03d63e6a8cd7ad2 R15: ffff888079cce450 [ 2253.130817][ C1] FS: 00007ff172b76700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 2253.130833][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2253.130845][ C1] CR2: ffffc9000635feb8 CR3: 000000001f96c000 CR4: 00000000003506e0 [ 2253.130861][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2253.130877][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2253.130888][ C1] Call Trace: [ 2253.130894][ C1] [ 2253.130903][ C1] ? validate_chain+0x119/0x58e0 [ 2253.130933][ C1] ? validate_chain+0x119/0x58e0 [ 2253.130961][ C1] ? mark_lock+0x9a/0x340 [ 2253.130986][ C1] __lock_acquire+0x1295/0x2000 [ 2253.131017][ C1] lock_acquire+0x1e3/0x520 [ 2253.131039][ C1] ? __stack_depot_save+0x1a9/0x650 [ 2253.131140][ C1] ? unwind_next_frame+0x1a2f/0x2200 [ 2253.131164][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.131188][ C1] ? notifier_call_chain+0x18c/0x3a0 [ 2253.131214][ C1] ? __netdev_update_features+0xe44/0x2070 [ 2253.131267][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 2253.131310][ C1] ? arch_stack_walk+0x105/0x140 [ 2253.131339][ C1] _raw_spin_lock_irqsave+0xd5/0x120 [ 2253.131359][ C1] ? __stack_depot_save+0x1a9/0x650 [ 2253.131378][ C1] ? _raw_spin_lock+0x40/0x40 [ 2253.131395][ C1] ? stack_trace_save+0x117/0x1c0 [ 2253.131422][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 2253.131451][ C1] __stack_depot_save+0x1a9/0x650 [ 2253.131474][ C1] save_stack+0x108/0x1e0 [ 2253.131496][ C1] ? __reset_page_owner+0x190/0x190 [ 2253.131516][ C1] ? post_alloc_hook+0x1e6/0x210 [ 2253.131536][ C1] ? get_page_from_freelist+0x321c/0x33a0 [ 2253.131559][ C1] ? __alloc_pages+0x255/0x670 [ 2253.131580][ C1] ? alloc_slab_page+0x6a/0x160 [ 2253.131600][ C1] ? new_slab+0x84/0x2f0 [ 2253.131616][ C1] ? ___slab_alloc+0xa85/0x10a0 [ 2253.131634][ C1] ? kmem_cache_alloc_node+0x1f3/0x350 [ 2253.131651][ C1] ? __alloc_skb+0x181/0x420 [ 2253.131678][ C1] ? ethnl_default_notify+0x21a/0x5e0 [ 2253.131755][ C1] ? ethnl_netdev_event+0x58/0x70 [ 2253.131773][ C1] ? notifier_call_chain+0x18c/0x3a0 [ 2253.131801][ C1] ? __netdev_update_features+0xe44/0x2070 [ 2253.131823][ C1] ? netdev_change_features+0x76/0x1b0 [ 2253.131843][ C1] ? team_device_event+0x2fc/0x4b0 [ 2253.131907][ C1] ? notifier_call_chain+0x18c/0x3a0 [ 2253.131936][ C1] ? __netdev_update_features+0xe44/0x2070 [ 2253.131959][ C1] ? get_page_from_freelist+0x79c/0x33a0 [ 2253.131987][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.132015][ C1] __set_page_owner+0x29/0x380 [ 2253.132040][ C1] post_alloc_hook+0x1e6/0x210 [ 2253.132063][ C1] get_page_from_freelist+0x321c/0x33a0 [ 2253.132103][ C1] ? __might_sleep+0xc0/0xc0 [ 2253.132132][ C1] ? mark_lock+0x9a/0x340 [ 2253.132162][ C1] ? __next_zones_zonelist+0xa2/0x130 [ 2253.132188][ C1] ? __alloc_pages+0x670/0x670 [ 2253.132211][ C1] ? prepare_alloc_pages+0x35b/0x5b0 [ 2253.132239][ C1] __alloc_pages+0x255/0x670 [ 2253.132264][ C1] ? zone_statistics+0x170/0x170 [ 2253.132292][ C1] ? alloc_pages+0x510/0x780 [ 2253.132317][ C1] alloc_slab_page+0x6a/0x160 [ 2253.132339][ C1] new_slab+0x84/0x2f0 [ 2253.132360][ C1] ___slab_alloc+0xa85/0x10a0 [ 2253.132381][ C1] ? __alloc_skb+0x181/0x420 [ 2253.132405][ C1] kmem_cache_alloc_node+0x1f3/0x350 [ 2253.132423][ C1] ? notifier_call_chain+0x18c/0x3a0 [ 2253.132452][ C1] ? __alloc_skb+0x181/0x420 [ 2253.132475][ C1] __alloc_skb+0x181/0x420 [ 2253.132494][ C1] ? __netdev_update_features+0xe44/0x2070 [ 2253.132515][ C1] ? netdev_change_features+0x76/0x1b0 [ 2253.132536][ C1] ? team_device_event+0x2fc/0x4b0 [ 2253.132556][ C1] ? notifier_call_chain+0x18c/0x3a0 [ 2253.132587][ C1] ? napi_build_skb+0x270/0x270 [ 2253.132608][ C1] ? rcu_rdp_is_offloaded+0x170/0x1b0 [ 2253.132631][ C1] ethnl_default_notify+0x21a/0x5e0 [ 2253.132655][ C1] ethnl_netdev_event+0x58/0x70 [ 2253.132675][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.132709][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.132741][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.132773][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.132801][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.132831][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.132905][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.132937][ C1] netdev_change_features+0x76/0x1b0 [ 2253.132959][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.132982][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.133006][ C1] team_device_event+0x2fc/0x4b0 [ 2253.133029][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.133062][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.133093][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.133124][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.133149][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.133167][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.133194][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.133225][ C1] netdev_change_features+0x76/0x1b0 [ 2253.133246][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.133269][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.133293][ C1] team_device_event+0x2fc/0x4b0 [ 2253.133315][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.133346][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.133376][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.133406][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.133431][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.133461][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.133486][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.133514][ C1] netdev_change_features+0x76/0x1b0 [ 2253.133534][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.133556][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.133578][ C1] team_device_event+0x2fc/0x4b0 [ 2253.133598][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.133627][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.133654][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.133683][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.133707][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.133725][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.133751][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.133780][ C1] netdev_change_features+0x76/0x1b0 [ 2253.133801][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.133823][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.133846][ C1] team_device_event+0x2fc/0x4b0 [ 2253.133876][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.133907][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.133935][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.133964][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.133988][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.134006][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.134033][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.134062][ C1] netdev_change_features+0x76/0x1b0 [ 2253.134082][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.134103][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.134127][ C1] team_device_event+0x2fc/0x4b0 [ 2253.134148][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.134178][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.134208][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.134237][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.134261][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.134279][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.134305][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.134353][ C1] netdev_change_features+0x76/0x1b0 [ 2253.134374][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.134398][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.134422][ C1] team_device_event+0x2fc/0x4b0 [ 2253.134445][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.134478][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.134508][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.134539][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.134565][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.134584][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.134612][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.134643][ C1] netdev_change_features+0x76/0x1b0 [ 2253.134664][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.134687][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.134712][ C1] team_device_event+0x2fc/0x4b0 [ 2253.134734][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.134766][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.134796][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.134826][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.134852][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.134877][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.134905][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.134935][ C1] netdev_change_features+0x76/0x1b0 [ 2253.134955][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.134978][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.135002][ C1] team_device_event+0x2fc/0x4b0 [ 2253.135025][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.135057][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.135086][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.135117][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.135142][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.135161][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.135190][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.135220][ C1] netdev_change_features+0x76/0x1b0 [ 2253.135242][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.135266][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.135291][ C1] team_device_event+0x2fc/0x4b0 [ 2253.135315][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.135347][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.135377][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.135408][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.135434][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.135452][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.135480][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.135511][ C1] netdev_change_features+0x76/0x1b0 [ 2253.135533][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.135557][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.135580][ C1] team_device_event+0x2fc/0x4b0 [ 2253.135603][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.135635][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.135666][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.135695][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.135720][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.135737][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.135763][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.135793][ C1] netdev_change_features+0x76/0x1b0 [ 2253.135813][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.135835][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.135859][ C1] team_device_event+0x2fc/0x4b0 [ 2253.135890][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.135922][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.135952][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.135982][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.136008][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.136027][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.136056][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.136087][ C1] netdev_change_features+0x76/0x1b0 [ 2253.136109][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.136132][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.136155][ C1] team_device_event+0x2fc/0x4b0 [ 2253.136177][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.136209][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.136240][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.136271][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.136297][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.136315][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.136344][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.136374][ C1] netdev_change_features+0x76/0x1b0 [ 2253.136396][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.136420][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.136445][ C1] team_device_event+0x2fc/0x4b0 [ 2253.136468][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.136501][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.136531][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.136562][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.136588][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.136608][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.136636][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.136666][ C1] netdev_change_features+0x76/0x1b0 [ 2253.136687][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.136709][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.136733][ C1] team_device_event+0x2fc/0x4b0 [ 2253.136754][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.136785][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.136814][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.136843][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.136875][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.136894][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.136922][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.136952][ C1] netdev_change_features+0x76/0x1b0 [ 2253.136973][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.136997][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.137021][ C1] team_device_event+0x2fc/0x4b0 [ 2253.137044][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.137076][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.137107][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.137137][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.137163][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.137181][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.137209][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.137241][ C1] netdev_change_features+0x76/0x1b0 [ 2253.137273][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.137295][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.137318][ C1] team_device_event+0x2fc/0x4b0 [ 2253.137340][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.137370][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.137398][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.137427][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.137451][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.137469][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.137496][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.137526][ C1] netdev_change_features+0x76/0x1b0 [ 2253.137546][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.137568][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.137590][ C1] team_device_event+0x2fc/0x4b0 [ 2253.137612][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.137642][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.137671][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.137700][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.137724][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.137741][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.137767][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.137794][ C1] netdev_change_features+0x76/0x1b0 [ 2253.137813][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.137835][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.137857][ C1] team_device_event+0x2fc/0x4b0 [ 2253.137886][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.137915][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.137942][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.137971][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.137994][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.138012][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.138038][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.138066][ C1] netdev_change_features+0x76/0x1b0 [ 2253.138086][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.138108][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.138131][ C1] team_device_event+0x2fc/0x4b0 [ 2253.138151][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.138181][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.138210][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.138238][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.138262][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.138280][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.138306][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.138335][ C1] netdev_change_features+0x76/0x1b0 [ 2253.138355][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.138376][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.138396][ C1] team_device_event+0x2fc/0x4b0 [ 2253.138417][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.138446][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.138474][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.138502][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.138526][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.138544][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.138570][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.138599][ C1] netdev_change_features+0x76/0x1b0 [ 2253.138619][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.138642][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.138665][ C1] team_device_event+0x2fc/0x4b0 [ 2253.138686][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.138716][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.138743][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.138771][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.138795][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.138813][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.138840][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.138875][ C1] netdev_change_features+0x76/0x1b0 [ 2253.138894][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.138916][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.138939][ C1] team_device_event+0x2fc/0x4b0 [ 2253.138960][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.138989][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.139016][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.139044][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.139067][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.139085][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.139111][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.139139][ C1] netdev_change_features+0x76/0x1b0 [ 2253.139159][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.139198][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.139223][ C1] team_device_event+0x2fc/0x4b0 [ 2253.139246][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.139278][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.139318][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.139347][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.139389][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.139408][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.139435][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.139466][ C1] netdev_change_features+0x76/0x1b0 [ 2253.139488][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.139512][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.139548][ C1] team_device_event+0x2fc/0x4b0 [ 2253.139568][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.139595][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.139622][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.139649][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.139673][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.139691][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.139717][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.139746][ C1] netdev_change_features+0x76/0x1b0 [ 2253.139767][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.139789][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.139810][ C1] team_device_event+0x2fc/0x4b0 [ 2253.139832][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.139862][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.139897][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.139922][ C1] ? read_lock_is_recursive+0x20/0x20 [ 2253.139946][ C1] ? rcu_lock_release+0x5/0x30 [ 2253.139963][ C1] ? bond_netdev_event+0x168/0xe40 [ 2253.139988][ C1] ? __lock_acquire+0x2000/0x2000 [ 2253.140016][ C1] netdev_change_features+0x76/0x1b0 [ 2253.140035][ C1] ? __netdev_update_features+0x2070/0x2070 [ 2253.140056][ C1] ? __team_compute_features+0x43c/0x470 [ 2253.140078][ C1] team_device_event+0x2fc/0x4b0 [ 2253.140099][ C1] notifier_call_chain+0x18c/0x3a0 [ 2253.140128][ C1] __netdev_update_features+0xe44/0x2070 [ 2253.140153][ C1] ? vxlan_fdb_offloaded_set+0x7a0/0x7a0 [ 2253.140224][ C1] ? dev_xdp_attach+0xed0/0xed0 [ 2253.140244][ C1] ? notifier_call_chain+0x38b/0x3a0 [ 2253.140271][ C1] ? __netdev_update_lower_level+0x265/0x370 [ 2253.140295][ C1] ? __netdev_upper_dev_link+0x60f/0x750 [ 2253.140316][ C1] ? netdev_upper_dev_link+0xe0/0xe0 [ 2253.140335][ C1] ? mark_lock+0x9a/0x340 [ 2253.140358][ C1] ? __local_bh_enable_ip+0x179/0x1f0 [ 2253.140380][ C1] netdev_update_features+0x71/0x1d0 [ 2253.140411][ C1] ? dev_disable_lro+0x1d0/0x1d0 [ 2253.140435][ C1] ? lockdep_rtnl_is_held+0x26/0x30 [ 2253.140478][ C1] dev_disable_lro+0x47/0x1d0 [ 2253.140501][ C1] hsr_add_port+0x5bf/0x650 [ 2253.140564][ C1] hsr_dev_finalize+0x479/0x650 [ 2253.140595][ C1] hsr_newlink+0x6aa/0x760 [ 2253.140622][ C1] ? hsr_get_node_list+0xab0/0xab0 [ 2253.140648][ C1] ? rtnl_create_link+0x905/0xc00 [ 2253.140669][ C1] ? hsr_get_node_list+0xab0/0xab0 [ 2253.140696][ C1] rtnl_newlink+0x1468/0x2010 [ 2253.140725][ C1] ? do_raw_spin_lock+0x14d/0x3a0 [ 2253.140757][ C1] ? rtnl_setlink+0x580/0x580 [ 2253.140780][ C1] ? __mutex_lock_common+0x1596/0x2530 [ 2253.140831][ C1] ? mutex_lock_io_nested+0x60/0x60 [ 2253.140857][ C1] ? cap_capable+0x1b4/0x240 [ 2253.140890][ C1] ? rtnl_setlink+0x580/0x580 [ 2253.140908][ C1] rtnetlink_rcv_msg+0x825/0xf40 [ 2253.140934][ C1] ? rtnetlink_bind+0x80/0x80 [ 2253.140957][ C1] ? lockdep_hardirqs_on_prepare+0x43c/0x7a0 [ 2253.140980][ C1] ? print_irqtrace_events+0x220/0x220 [ 2253.141005][ C1] ? __local_bh_enable_ip+0x168/0x1f0 [ 2253.141025][ C1] ? lockdep_hardirqs_on+0x98/0x140 [ 2253.141046][ C1] ? __local_bh_enable_ip+0x168/0x1f0 [ 2253.141066][ C1] ? local_bh_enable+0x5/0x20 [ 2253.141091][ C1] ? _local_bh_enable+0xa0/0xa0 [ 2253.141115][ C1] ? __dev_queue_xmit+0x15ac/0x38b0 [ 2253.141149][ C1] ? netdev_core_pick_tx+0x330/0x330 [ 2253.141177][ C1] ? ref_tracker_free+0x63c/0x7d0 [ 2253.141200][ C1] netlink_rcv_skb+0x1df/0x430 [ 2253.141244][ C1] ? rtnetlink_bind+0x80/0x80 [ 2253.141267][ C1] ? netlink_ack+0x12a0/0x12a0 [ 2253.141298][ C1] netlink_unicast+0x7c3/0x990 [ 2253.141348][ C1] ? netlink_detachskb+0x90/0x90 [ 2253.141373][ C1] ? __virt_addr_valid+0x22f/0x2e0 [ 2253.141401][ C1] ? __phys_addr_symbol+0x2f/0x70 [ 2253.141426][ C1] ? __check_object_size+0x4e1/0xa40 [ 2253.141446][ C1] ? bpf_lsm_netlink_send+0x9/0x10 [ 2253.141470][ C1] netlink_sendmsg+0xa2a/0xd60 [ 2253.141495][ C1] ? netlink_getsockopt+0x5e0/0x5e0 [ 2253.141517][ C1] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2253.141540][ C1] ? security_socket_sendmsg+0x81/0xa0 [ 2253.141557][ C1] ? netlink_getsockopt+0x5e0/0x5e0 [ 2253.141576][ C1] ____sys_sendmsg+0x58f/0x890 [ 2253.141601][ C1] ? __sys_sendmsg_sock+0x30/0x30 [ 2253.141630][ C1] __sys_sendmsg+0x2ad/0x390 [ 2253.141651][ C1] ? ____sys_sendmsg+0x890/0x890 [ 2253.141688][ C1] ? lockdep_hardirqs_on_prepare+0x43c/0x7a0 [ 2253.141739][ C1] ? syscall_enter_from_user_mode+0x32/0x230 [ 2253.141781][ C1] ? lockdep_hardirqs_on+0x98/0x140 [ 2253.141804][ C1] ? syscall_enter_from_user_mode+0x32/0x230 [ 2253.141829][ C1] do_syscall_64+0x41/0xc0 [ 2253.141859][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2253.141890][ C1] RIP: 0033:0x7ff171e8c169 [ 2253.141908][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2253.141924][ C1] RSP: 002b:00007ff172b76168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2253.141946][ C1] RAX: ffffffffffffffda RBX: 00007ff171fac120 RCX: 00007ff171e8c169 [ 2253.141963][ C1] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000008 [ 2253.141975][ C1] RBP: 00007ff171ee7ca1 R08: 0000000000000000 R09: 0000000000000000 [ 2253.141987][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2253.142000][ C1] R13: 00007ffe36a20b1f R14: 00007ff172b76300 R15: 0000000000022000 [ 2253.142022][ C1] [ 2253.142029][ C1] Modules linked in: [ 2255.518694][ C1] ---[ end trace 0000000000000000 ]--- [ 2255.518705][ C1] RIP: 0010:validate_chain+0x1f/0x58e0 [ 2255.518732][ C1] Code: 77 00 eb 84 e8 92 16 43 09 66 90 f3 0f 1e fa 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec 80 02 00 00 49 89 ce <89> 54 24 60 48 89 bc 24 80 00 00 00 65 48 8b 04 25 28 00 00 00 48 [ 2255.518744][ C1] RSP: 0018:ffffc9000635fec0 EFLAGS: 00010086 [ 2255.518756][ C1] RAX: 1ffffffff2003fdc RBX: ffffffff9001fee0 RCX: a03d63e6a8cd7ad2 [ 2255.518767][ C1] RDX: 0000000000000000 RSI: ffff888079cce430 RDI: ffff888079ccd940 [ 2255.518777][ C1] RBP: ffffc90006360168 R08: dffffc0000000000 R09: fffffbfff206504d [ 2255.518788][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888079ccd940 [ 2255.518797][ C1] R13: ffff888079ccd940 R14: a03d63e6a8cd7ad2 R15: ffff888079cce450 [ 2255.518808][ C1] FS: 00007ff172b76700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 2255.518820][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2255.518830][ C1] CR2: ffffc9000635feb8 CR3: 000000001f96c000 CR4: 00000000003506e0 [ 2255.518842][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2255.518850][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2255.518860][ C1] Kernel panic - not syncing: Fatal exception in interrupt [ 2255.519167][ C1] Kernel Offset: disabled