INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.15' (ECDSA) to the list of known hosts. 2018/04/21 01:52:26 fuzzer started 2018/04/21 01:52:27 dialing manager at 10.128.0.26:39431 syzkaller login: [ 55.633250] can: request_module (can-proto-0) failed. [ 55.642579] can: request_module (can-proto-0) failed. 2018/04/21 01:52:53 kcov=true, comps=true 2018/04/21 01:52:56 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') readv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/125, 0x7d}], 0x1) 2018/04/21 01:52:56 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sched_yield() 2018/04/21 01:52:56 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x3, 0x4) socketpair$inet6(0xa, 0x200007fffd, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x0, 0x1, 0x4}}, 0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x9}, &(0x7f00000002c0)=0x8) r4 = socket(0x400020000000010, 0x3, 0x0) read(r4, &(0x7f0000000180)=""/190, 0x69) write(r4, &(0x7f00000000c0)="1f00000056000d6dfcffff00bc0203030700ef2104173f81000000020000", 0x1e) write(r0, &(0x7f0000c9afe1)="1f0000001500ff03f92f01051c180fff0100000a08000200000e00a0", 0x1c) r5 = socket$netlink(0x10, 0x3, 0x14) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x891b, &(0x7f0000000600)={'syzkaller1\x00', {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000640)={0x0, 0x1}, &(0x7f0000000680)=0x8) socketpair(0x0, 0x2, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000500)={r3, @in6={{0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x16}}}, 0xce, 0x9}, &(0x7f00000005c0)=0x90) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000080)={0x9, 0x1, 0x0, 0x4}, 0xc) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f00000004c0)={'syzkaller1\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="310000001f000000000000000000000006000000ac1414bbe000000200000007070100000000000000000000000000000000070000000000000000000000000000000000000000006ef1f38b514bdb2d01010006000000090000000100000000000000000000ffffffffffff00000000000000000000ffffe00000024e2300061f00000000000000000000000000000000153242cdfe3337fc0100020000000000000009000000000700000000000000ff0700000000000003000000800000000800000004000000"]}) 2018/04/21 01:52:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000140)={{0x0, 0x0, 0x8, 0x0, "d70708aa670663b5e9259a5a85d0b7b8f49f8bd63be1748f4914877cd13e9a3c884dc1ee92e873edfe006337"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "26133ce1592e4802cc0e75b6b613b6dfca609524a8e6c9f01cef1ddd768e706efd0b146312c7bbea058eca5f2f1f6b0f6f8b9f3fda3719eb1f7e61c62d312fef", &(0x7f0000000100)='\x00', 0x1}) sendto$inet(r0, &(0x7f0000000000)='\b', 0x1, 0x20000000, &(0x7f0000385ff0)={0x2, 0x1, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x2000000007fff, 0x80000001}, 0x14) sendmmsg(r0, &(0x7f0000278000)=[{{&(0x7f00002b8000)=@ethernet={0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0x80, &(0x7f0000282f90)=[{&(0x7f0000e0c000)='3', 0x1}], 0x1, &(0x7f0000942e20)}}], 0x1, 0x0) 2018/04/21 01:52:56 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}, 0x0, 0xfffffffffffffffd}) 2018/04/21 01:52:56 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000001240)={0x2, 0x1, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/21 01:52:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)='C', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f00000002c0)="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", 0x5c1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/21 01:52:56 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000dc01)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1, 0x2000}}, 0x1c}, 0x1}, 0x0) r1 = memfd_create(&(0x7f0000000000)='5trustedvboxnet0@\x00', 0x2) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) [ 60.396985] IPVS: ftp: loaded support on port[0] = 21 [ 60.507197] IPVS: ftp: loaded support on port[0] = 21 [ 60.514483] IPVS: ftp: loaded support on port[0] = 21 [ 60.550606] IPVS: ftp: loaded support on port[0] = 21 [ 60.569880] IPVS: ftp: loaded support on port[0] = 21 [ 60.583877] IPVS: ftp: loaded support on port[0] = 21 [ 60.596141] IPVS: ftp: loaded support on port[0] = 21 [ 60.624676] IPVS: ftp: loaded support on port[0] = 21 [ 62.613277] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.619773] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.642993] device bridge_slave_0 entered promiscuous mode [ 62.656581] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.663006] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.678870] device bridge_slave_0 entered promiscuous mode [ 62.742862] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.749300] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.787014] device bridge_slave_1 entered promiscuous mode [ 62.809719] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.816159] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.834985] device bridge_slave_1 entered promiscuous mode [ 62.843891] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.850307] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.862420] device bridge_slave_0 entered promiscuous mode [ 62.870398] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.876815] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.884847] device bridge_slave_0 entered promiscuous mode [ 62.893881] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.900282] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.908085] device bridge_slave_0 entered promiscuous mode [ 62.923894] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.930336] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.948011] device bridge_slave_0 entered promiscuous mode [ 62.961876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.970599] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.977717] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.984118] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.000388] device bridge_slave_0 entered promiscuous mode [ 63.026853] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.033274] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.051884] device bridge_slave_1 entered promiscuous mode [ 63.060312] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.066712] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.074474] device bridge_slave_1 entered promiscuous mode [ 63.082317] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.088700] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.102801] device bridge_slave_0 entered promiscuous mode [ 63.115152] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.124228] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.130632] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.144169] device bridge_slave_1 entered promiscuous mode [ 63.151187] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.157559] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.166420] device bridge_slave_1 entered promiscuous mode [ 63.176563] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.182973] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.195160] device bridge_slave_1 entered promiscuous mode [ 63.204737] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 63.213880] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.220271] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.228167] device bridge_slave_1 entered promiscuous mode [ 63.236346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.264291] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 63.271824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 63.280236] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 63.311320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 63.335260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 63.374181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.391117] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.398903] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.448586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.458189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.491386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.585399] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.703767] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.720953] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.774818] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.822361] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.842745] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.853521] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.867358] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.892894] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.902453] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.925452] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.942454] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.979552] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.996961] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.030295] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.052114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.059159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.073196] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.080204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.101401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.108495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.122145] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.131585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.140667] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.149200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.181980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.195382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.204437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.211613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.224863] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.234293] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.243189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.260721] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.271968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.303371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.328672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.341974] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.350217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.359773] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.368206] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.375104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.385448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.399857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.408526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.513330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.520309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.589666] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.603981] team0: Port device team_slave_0 added [ 64.675690] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.691426] team0: Port device team_slave_0 added [ 64.704388] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.717720] team0: Port device team_slave_0 added [ 64.732534] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.749676] team0: Port device team_slave_0 added [ 64.780607] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.797701] team0: Port device team_slave_0 added [ 64.810908] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.821592] team0: Port device team_slave_0 added [ 64.834926] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.844418] team0: Port device team_slave_1 added [ 64.851643] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.866892] team0: Port device team_slave_1 added [ 64.874776] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.888132] team0: Port device team_slave_0 added [ 64.899731] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.909453] team0: Port device team_slave_1 added [ 64.915480] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.929788] team0: Port device team_slave_1 added [ 64.944863] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.954498] team0: Port device team_slave_1 added [ 64.970829] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.988714] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.999420] team0: Port device team_slave_0 added [ 65.008980] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.020130] team0: Port device team_slave_1 added [ 65.031825] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.055889] team0: Port device team_slave_1 added [ 65.069846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.084267] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.102918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.110225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.123812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.133881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.140922] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.147860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.157285] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.165268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.173309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.189547] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.196619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.208513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.221230] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.228803] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.236973] team0: Port device team_slave_1 added [ 65.244897] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.255698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.268489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.285375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.304697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.314323] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.323315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.330883] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.338216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.353930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.374933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.388477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.396008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.403839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.412908] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.420292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.428577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.436794] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.445540] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.455827] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.464663] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.473558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.481549] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.488702] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.496105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.538063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.560510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.583745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.592750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.600595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.608494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.616366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.624146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.631908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.639712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.647757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.655270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.662879] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.672735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.684384] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.691526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.706393] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.716444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.731619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.747918] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.755977] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.764651] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.771513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.779855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.797332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.818900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.827729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.835634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.845980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.854659] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.874952] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.885212] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.900367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.933521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.953311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.966234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.979606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.988737] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.996711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.005866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.026505] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.035818] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.054489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.065935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.092826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.120681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.144624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.152007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.159888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.188253] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.194811] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.201829] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.208234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.225762] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.234218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.250295] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.256704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.263344] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.269702] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.282627] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.291604] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.297983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.304647] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.311051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.318792] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.333688] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.340084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.346755] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.353145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.400141] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.613438] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.619862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.626558] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.632940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.657327] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.678063] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.684469] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.691129] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.697512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.717793] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.724591] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.730997] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.737690] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.744087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.768412] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.779387] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.785808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.792489] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.798888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.811247] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.259639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.271495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.285613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.293680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.301339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.308724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.316181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.381280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.461457] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.590762] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.669700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.725239] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.753260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.829052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.858144] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.874521] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.893578] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.095620] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.178238] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.187780] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.246659] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.299634] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.305975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.316546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.353375] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.366600] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.376203] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.382565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.394889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.551162] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.559164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.569508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.647756] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.654058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.662838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.704752] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.713824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.733794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.818280] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.845366] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.851749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.861434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.916927] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.924625] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.946335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.954965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.991737] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.998741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.007767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.048815] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.164790] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.286747] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.379280] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.428556] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.462872] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/21 01:53:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000dc01)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1, 0x2000}}, 0x1c}, 0x1}, 0x0) r1 = memfd_create(&(0x7f0000000000)='5trustedvboxnet0@\x00', 0x2) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) 2018/04/21 01:53:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000dc01)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1, 0x2000}}, 0x1c}, 0x1}, 0x0) r1 = memfd_create(&(0x7f0000000000)='5trustedvboxnet0@\x00', 0x2) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) 2018/04/21 01:53:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000dc01)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1, 0x2000}}, 0x1c}, 0x1}, 0x0) r1 = memfd_create(&(0x7f0000000000)='5trustedvboxnet0@\x00', 0x2) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) 2018/04/21 01:53:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000140)={{0x0, 0x0, 0x8, 0x0, "d70708aa670663b5e9259a5a85d0b7b8f49f8bd63be1748f4914877cd13e9a3c884dc1ee92e873edfe006337"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "26133ce1592e4802cc0e75b6b613b6dfca609524a8e6c9f01cef1ddd768e706efd0b146312c7bbea058eca5f2f1f6b0f6f8b9f3fda3719eb1f7e61c62d312fef", &(0x7f0000000100)='\x00', 0x1}) sendto$inet(r0, &(0x7f0000000000)='\b', 0x1, 0x20000000, &(0x7f0000385ff0)={0x2, 0x1, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x2000000007fff, 0x80000001}, 0x14) sendmmsg(r0, &(0x7f0000278000)=[{{&(0x7f00002b8000)=@ethernet={0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0x80, &(0x7f0000282f90)=[{&(0x7f0000e0c000)='3', 0x1}], 0x1, &(0x7f0000942e20)}}], 0x1, 0x0) 2018/04/21 01:53:13 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sched_yield() 2018/04/21 01:53:13 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000140)={{0x0, 0x0, 0x8, 0x0, "d70708aa670663b5e9259a5a85d0b7b8f49f8bd63be1748f4914877cd13e9a3c884dc1ee92e873edfe006337"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "26133ce1592e4802cc0e75b6b613b6dfca609524a8e6c9f01cef1ddd768e706efd0b146312c7bbea058eca5f2f1f6b0f6f8b9f3fda3719eb1f7e61c62d312fef", &(0x7f0000000100)='\x00', 0x1}) sendto$inet(r0, &(0x7f0000000000)='\b', 0x1, 0x20000000, &(0x7f0000385ff0)={0x2, 0x1, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x2000000007fff, 0x80000001}, 0x14) sendmmsg(r0, &(0x7f0000278000)=[{{&(0x7f00002b8000)=@ethernet={0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0x80, &(0x7f0000282f90)=[{&(0x7f0000e0c000)='3', 0x1}], 0x1, &(0x7f0000942e20)}}], 0x1, 0x0) 2018/04/21 01:53:13 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000001240)={0x2, 0x1, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/21 01:53:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000140)={{0x0, 0x0, 0x8, 0x0, "d70708aa670663b5e9259a5a85d0b7b8f49f8bd63be1748f4914877cd13e9a3c884dc1ee92e873edfe006337"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "26133ce1592e4802cc0e75b6b613b6dfca609524a8e6c9f01cef1ddd768e706efd0b146312c7bbea058eca5f2f1f6b0f6f8b9f3fda3719eb1f7e61c62d312fef", &(0x7f0000000100)='\x00', 0x1}) sendto$inet(r0, &(0x7f0000000000)='\b', 0x1, 0x20000000, &(0x7f0000385ff0)={0x2, 0x1, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x2000000007fff, 0x80000001}, 0x14) sendmmsg(r0, &(0x7f0000278000)=[{{&(0x7f00002b8000)=@ethernet={0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0x80, &(0x7f0000282f90)=[{&(0x7f0000e0c000)='3', 0x1}], 0x1, &(0x7f0000942e20)}}], 0x1, 0x0) [ 77.211515] syz-executor4 (6649) used greatest stack depth: 13336 bytes left 2018/04/21 01:53:13 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') readv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/125, 0x7d}], 0x1) 2018/04/21 01:53:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000140)={{0x0, 0x0, 0x8, 0x0, "d70708aa670663b5e9259a5a85d0b7b8f49f8bd63be1748f4914877cd13e9a3c884dc1ee92e873edfe006337"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "26133ce1592e4802cc0e75b6b613b6dfca609524a8e6c9f01cef1ddd768e706efd0b146312c7bbea058eca5f2f1f6b0f6f8b9f3fda3719eb1f7e61c62d312fef", &(0x7f0000000100)='\x00', 0x1}) sendto$inet(r0, &(0x7f0000000000)='\b', 0x1, 0x20000000, &(0x7f0000385ff0)={0x2, 0x1, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x2000000007fff, 0x80000001}, 0x14) sendmmsg(r0, &(0x7f0000278000)=[{{&(0x7f00002b8000)=@ethernet={0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0x80, &(0x7f0000282f90)=[{&(0x7f0000e0c000)='3', 0x1}], 0x1, &(0x7f0000942e20)}}], 0x1, 0x0) 2018/04/21 01:53:13 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000140)={{0x0, 0x0, 0x8, 0x0, "d70708aa670663b5e9259a5a85d0b7b8f49f8bd63be1748f4914877cd13e9a3c884dc1ee92e873edfe006337"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "26133ce1592e4802cc0e75b6b613b6dfca609524a8e6c9f01cef1ddd768e706efd0b146312c7bbea058eca5f2f1f6b0f6f8b9f3fda3719eb1f7e61c62d312fef", &(0x7f0000000100)='\x00', 0x1}) sendto$inet(r0, &(0x7f0000000000)='\b', 0x1, 0x20000000, &(0x7f0000385ff0)={0x2, 0x1, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x2000000007fff, 0x80000001}, 0x14) sendmmsg(r0, &(0x7f0000278000)=[{{&(0x7f00002b8000)=@ethernet={0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0x80, &(0x7f0000282f90)=[{&(0x7f0000e0c000)='3', 0x1}], 0x1, &(0x7f0000942e20)}}], 0x1, 0x0) 2018/04/21 01:53:13 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sched_yield() 2018/04/21 01:53:13 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x3, 0x4) socketpair$inet6(0xa, 0x200007fffd, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x0, 0x1, 0x4}}, 0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x9}, &(0x7f00000002c0)=0x8) r4 = socket(0x400020000000010, 0x3, 0x0) read(r4, &(0x7f0000000180)=""/190, 0x69) write(r4, &(0x7f00000000c0)="1f00000056000d6dfcffff00bc0203030700ef2104173f81000000020000", 0x1e) write(r0, &(0x7f0000c9afe1)="1f0000001500ff03f92f01051c180fff0100000a08000200000e00a0", 0x1c) r5 = socket$netlink(0x10, 0x3, 0x14) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x891b, &(0x7f0000000600)={'syzkaller1\x00', {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000640)={0x0, 0x1}, &(0x7f0000000680)=0x8) socketpair(0x0, 0x2, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000500)={r3, @in6={{0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x16}}}, 0xce, 0x9}, &(0x7f00000005c0)=0x90) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000080)={0x9, 0x1, 0x0, 0x4}, 0xc) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f00000004c0)={'syzkaller1\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="310000001f000000000000000000000006000000ac1414bbe000000200000007070100000000000000000000000000000000070000000000000000000000000000000000000000006ef1f38b514bdb2d01010006000000090000000100000000000000000000ffffffffffff00000000000000000000ffffe00000024e2300061f00000000000000000000000000000000153242cdfe3337fc0100020000000000000009000000000700000000000000ff0700000000000003000000800000000800000004000000"]}) 2018/04/21 01:53:13 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}, 0x0, 0xfffffffffffffffd}) 2018/04/21 01:53:13 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000001240)={0x2, 0x1, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/21 01:53:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)='C', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f00000002c0)="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", 0x5c1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/21 01:53:14 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sched_yield() 2018/04/21 01:53:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)='C', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f00000002c0)="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", 0x5c1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/21 01:53:14 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}, 0x0, 0xfffffffffffffffd}) 2018/04/21 01:53:14 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000001240)={0x2, 0x1, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/21 01:53:14 executing program 3: r0 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'nr0\x00', 0x601}) mmap(&(0x7f0000000000/0x53000)=nil, 0x53000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)) 2018/04/21 01:53:14 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') readv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/125, 0x7d}], 0x1) 2018/04/21 01:53:14 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000140)={{0x0, 0x0, 0x8, 0x0, "d70708aa670663b5e9259a5a85d0b7b8f49f8bd63be1748f4914877cd13e9a3c884dc1ee92e873edfe006337"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "26133ce1592e4802cc0e75b6b613b6dfca609524a8e6c9f01cef1ddd768e706efd0b146312c7bbea058eca5f2f1f6b0f6f8b9f3fda3719eb1f7e61c62d312fef", &(0x7f0000000100)='\x00', 0x1}) sendto$inet(r0, &(0x7f0000000000)='\b', 0x1, 0x20000000, &(0x7f0000385ff0)={0x2, 0x1, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x2000000007fff, 0x80000001}, 0x14) sendmmsg(r0, &(0x7f0000278000)=[{{&(0x7f00002b8000)=@ethernet={0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0x80, &(0x7f0000282f90)=[{&(0x7f0000e0c000)='3', 0x1}], 0x1, &(0x7f0000942e20)}}], 0x1, 0x0) 2018/04/21 01:53:14 executing program 2: creat(&(0x7f0000000200)='./file0\x00', 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f00000000c0)=[r0]) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:53:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)='C', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f00000002c0)="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", 0x5c1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/21 01:53:14 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}, 0x0, 0xfffffffffffffffd}) 2018/04/21 01:53:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000d01000)=0x7ff, 0x4) sendto$inet6(r0, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/21 01:53:14 executing program 3: r0 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'nr0\x00', 0x601}) mmap(&(0x7f0000000000/0x53000)=nil, 0x53000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)) 2018/04/21 01:53:14 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x3, 0x4) socketpair$inet6(0xa, 0x200007fffd, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x0, 0x1, 0x4}}, 0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x9}, &(0x7f00000002c0)=0x8) r4 = socket(0x400020000000010, 0x3, 0x0) read(r4, &(0x7f0000000180)=""/190, 0x69) write(r4, &(0x7f00000000c0)="1f00000056000d6dfcffff00bc0203030700ef2104173f81000000020000", 0x1e) write(r0, &(0x7f0000c9afe1)="1f0000001500ff03f92f01051c180fff0100000a08000200000e00a0", 0x1c) r5 = socket$netlink(0x10, 0x3, 0x14) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x891b, &(0x7f0000000600)={'syzkaller1\x00', {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000640)={0x0, 0x1}, &(0x7f0000000680)=0x8) socketpair(0x0, 0x2, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000500)={r3, @in6={{0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x16}}}, 0xce, 0x9}, &(0x7f00000005c0)=0x90) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000080)={0x9, 0x1, 0x0, 0x4}, 0xc) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f00000004c0)={'syzkaller1\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="310000001f000000000000000000000006000000ac1414bbe000000200000007070100000000000000000000000000000000070000000000000000000000000000000000000000006ef1f38b514bdb2d01010006000000090000000100000000000000000000ffffffffffff00000000000000000000ffffe00000024e2300061f00000000000000000000000000000000153242cdfe3337fc0100020000000000000009000000000700000000000000ff0700000000000003000000800000000800000004000000"]}) 2018/04/21 01:53:15 executing program 2: creat(&(0x7f0000000200)='./file0\x00', 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f00000000c0)=[r0]) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:53:15 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1f, &(0x7f00000000c0)) 2018/04/21 01:53:15 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0xe, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 2018/04/21 01:53:15 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, &(0x7f0000000000)={"65727370616e3000000000000200"}) 2018/04/21 01:53:15 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1f, &(0x7f00000000c0)) 2018/04/21 01:53:15 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') readv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/125, 0x7d}], 0x1) 2018/04/21 01:53:15 executing program 3: r0 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'nr0\x00', 0x601}) mmap(&(0x7f0000000000/0x53000)=nil, 0x53000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)) 2018/04/21 01:53:15 executing program 2: creat(&(0x7f0000000200)='./file0\x00', 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f00000000c0)=[r0]) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:53:15 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1f, &(0x7f00000000c0)) 2018/04/21 01:53:15 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, &(0x7f0000000000)={"65727370616e3000000000000200"}) 2018/04/21 01:53:15 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0xe, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 2018/04/21 01:53:15 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x3, 0x4) socketpair$inet6(0xa, 0x200007fffd, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x0, 0x1, 0x4}}, 0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x9}, &(0x7f00000002c0)=0x8) r4 = socket(0x400020000000010, 0x3, 0x0) read(r4, &(0x7f0000000180)=""/190, 0x69) write(r4, &(0x7f00000000c0)="1f00000056000d6dfcffff00bc0203030700ef2104173f81000000020000", 0x1e) write(r0, &(0x7f0000c9afe1)="1f0000001500ff03f92f01051c180fff0100000a08000200000e00a0", 0x1c) r5 = socket$netlink(0x10, 0x3, 0x14) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x891b, &(0x7f0000000600)={'syzkaller1\x00', {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000640)={0x0, 0x1}, &(0x7f0000000680)=0x8) socketpair(0x0, 0x2, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000500)={r3, @in6={{0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x16}}}, 0xce, 0x9}, &(0x7f00000005c0)=0x90) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000080)={0x9, 0x1, 0x0, 0x4}, 0xc) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f00000004c0)={'syzkaller1\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="310000001f000000000000000000000006000000ac1414bbe000000200000007070100000000000000000000000000000000070000000000000000000000000000000000000000006ef1f38b514bdb2d01010006000000090000000100000000000000000000ffffffffffff00000000000000000000ffffe00000024e2300061f00000000000000000000000000000000153242cdfe3337fc0100020000000000000009000000000700000000000000ff0700000000000003000000800000000800000004000000"]}) 2018/04/21 01:53:16 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1f, &(0x7f00000000c0)) 2018/04/21 01:53:16 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, &(0x7f0000000000)={"65727370616e3000000000000200"}) 2018/04/21 01:53:16 executing program 0: r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x1fffd, 0x0) fallocate(r0, 0x0, 0xa3cf, 0x40) fallocate(r0, 0x8, 0x0, 0x8000) 2018/04/21 01:53:16 executing program 2: creat(&(0x7f0000000200)='./file0\x00', 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f00000000c0)=[r0]) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:53:16 executing program 3: r0 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'nr0\x00', 0x601}) mmap(&(0x7f0000000000/0x53000)=nil, 0x53000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)) 2018/04/21 01:53:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0xe, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 2018/04/21 01:53:16 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1f, &(0x7f00000000c0)) 2018/04/21 01:53:16 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1f, &(0x7f00000000c0)) 2018/04/21 01:53:16 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, &(0x7f0000000000)={"65727370616e3000000000000200"}) 2018/04/21 01:53:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0xe, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 2018/04/21 01:53:16 executing program 2: mincore(&(0x7f0000f0c000/0x3000)=nil, 0x0, &(0x7f0000afaf0a)=""/246) 2018/04/21 01:53:16 executing program 0: r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x1fffd, 0x0) fallocate(r0, 0x0, 0xa3cf, 0x40) fallocate(r0, 0x8, 0x0, 0x8000) 2018/04/21 01:53:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x13f}}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$rdma_cm(r0, &(0x7f0000000100)=@query={0x13, 0x0, 0xfa00, {&(0x7f0000000380), r1, 0x1}}, 0x8) 2018/04/21 01:53:16 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1f, &(0x7f00000000c0)) 2018/04/21 01:53:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5437, &(0x7f0000981ffe)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) dup2(r1, r0) 2018/04/21 01:53:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5437, &(0x7f0000981ffe)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) dup2(r1, r0) 2018/04/21 01:53:16 executing program 0: r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x1fffd, 0x0) fallocate(r0, 0x0, 0xa3cf, 0x40) fallocate(r0, 0x8, 0x0, 0x8000) 2018/04/21 01:53:16 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x2000000000007, 0x0, 0xd000, 0x2000, &(0x7f000000b000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:53:16 executing program 2: mincore(&(0x7f0000f0c000/0x3000)=nil, 0x0, &(0x7f0000afaf0a)=""/246) 2018/04/21 01:53:16 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000c00)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) dup2(r0, r1) 2018/04/21 01:53:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x13f}}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$rdma_cm(r0, &(0x7f0000000100)=@query={0x13, 0x0, 0xfa00, {&(0x7f0000000380), r1, 0x1}}, 0x8) 2018/04/21 01:53:16 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000002ff5)='/dev/vcsa#\x00', 0x2, 0x1) write(r0, &(0x7f0000004080)="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", 0xfa4) 2018/04/21 01:53:16 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5437, &(0x7f0000981ffe)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) dup2(r1, r0) 2018/04/21 01:53:17 executing program 2: mincore(&(0x7f0000f0c000/0x3000)=nil, 0x0, &(0x7f0000afaf0a)=""/246) 2018/04/21 01:53:17 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000002ff5)='/dev/vcsa#\x00', 0x2, 0x1) write(r0, &(0x7f0000004080)="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", 0xfa4) 2018/04/21 01:53:17 executing program 0: r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x1fffd, 0x0) fallocate(r0, 0x0, 0xa3cf, 0x40) fallocate(r0, 0x8, 0x0, 0x8000) 2018/04/21 01:53:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x13f}}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$rdma_cm(r0, &(0x7f0000000100)=@query={0x13, 0x0, 0xfa00, {&(0x7f0000000380), r1, 0x1}}, 0x8) 2018/04/21 01:53:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5437, &(0x7f0000981ffe)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) dup2(r1, r0) 2018/04/21 01:53:17 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5437, &(0x7f0000981ffe)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) dup2(r1, r0) 2018/04/21 01:53:17 executing program 2: mincore(&(0x7f0000f0c000/0x3000)=nil, 0x0, &(0x7f0000afaf0a)=""/246) 2018/04/21 01:53:17 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000002ff5)='/dev/vcsa#\x00', 0x2, 0x1) write(r0, &(0x7f0000004080)="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", 0xfa4) 2018/04/21 01:53:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x13f}}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$rdma_cm(r0, &(0x7f0000000100)=@query={0x13, 0x0, 0xfa00, {&(0x7f0000000380), r1, 0x1}}, 0x8) 2018/04/21 01:53:17 executing program 0: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @local}, @in6}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, @in6=@remote={0xfe, 0x80, [], 0xbb}}, {0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000000000, 0x10b6}, {0x7fffffff}, 0x0, 0x6e6bb1}, {{@in=@broadcast=0xffffffff}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x8}}, 0xe8) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f00000004c0)) umount2(&(0x7f0000000040)='/\x00', 0x0) 2018/04/21 01:53:17 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000c00)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) dup2(r0, r1) 2018/04/21 01:53:17 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x2000000000007, 0x0, 0xd000, 0x2000, &(0x7f000000b000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:53:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000c00)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) dup2(r0, r1) 2018/04/21 01:53:17 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000002ff5)='/dev/vcsa#\x00', 0x2, 0x1) write(r0, &(0x7f0000004080)="9f4f9540ff07520c5a9ec05a2c8013d53fd7c66b678f11032ee52509e872ff8ea5b03f8cd09139bf9f3a73cfd3d2c4f69f7a298b7bdb6026717234d0d056b4058205d5911c487b9fcc3b5a024073766a6fe08393a51cdba75c4823eb0651bb901c18cc6c21e1bc3dc43b98b89ee8a89e24545fcc16262c4c84f140a8affde6fb84fddee1256d7d2c6b086d1617235500326816243113750afdc7f882e8de3d063bda0ceb265b49ac2a0672a3e9eb7766593f8d22e584b37fdfa5fb3a10391c2ec2a4c76bdcf8c5b0fd558705dff9e650a23c624979e7a811640e216cf6b7732c6d223843ddfe30446e9dd5a35d272934ed268af9e3d6b57ab97f9b29a70df83c32a8814895411e6512b6a8be7c2fa70c1a5cd2279bc6896ffbbe9f462d4510e691f5fd094d7213d649edbda81dbb869f39c41f788f36271c2cf6b4be00631eaef54f244c45378b0baba2c04cc390f161acaf5a90a9d06394369dbf27e333141cf3d31927d6fd0c29f2389b2135cf07f06184564b83a136b41f04b88888a3c71f702f4010f6ca20928e4a752e5ab216eb183682c9b803e3eb481cea86d4a9af14efdf6b5a6d5e7701f29bd87ddcf0aa1ae3c661b5ae8a701e4bbfe3b9ca71fd5ff86f388b77345b1d61ba9961deafdd69891398559decb58c0aa8cb5b088681cad47bbe22ccb2c89b95a56822cee3cbedb551a3fbf0bcc76524aeaac8997fb09bcbe1c354492c7df4fc8009fe10246192894c91364c93c587000000000000000177637a6ce93b1f09e7f2649bca711bbc96b851c1bd7188231d8a05f3b1c05772c3f306187832940ed17798b19a8318d96eda700f4e3ec9d7e6edd56e50090b99b141f05a98fbddbe32f6f7eba7f70854f4b93f80b6e7013b0e18428494345dada1a11026ddbc61d5ee93d38b5b4d99669a99bbbcec57f09104c21a46840eb798f1eec89e1133a2af27a21f2af94a141ff5737211764906d44a1686dece9780c633af3383966bc7355ae37881a2731022b4573b4eb2a381e00ea262495fc4aa616767f5bec31a19209577bfe37f5d87b333eb9ff03641bcc5628e2750010cea07c8c23ca241fe98f16b975194b310e50adb5903a9d8fcab5d9af8ba1a372d52233651b76d2e1143c3ddc387c1d66ad4f563d9adf354914c8418085e5b523e9d0001cffb2fbfeeb6f6c0f22e631adaf444984eedeaee2dad4d8d6ca03fbf93c04a81f02306506ca4db8d8eab529df81526f583698b20226bd87cd23d2531b8de9a49f2c38cf3cabdc05f3f1ad49671c019a05c04d88ecca252d4ee7afc8fb6bee501f378629c34c50fddd7767064484c7e726e75c7d84de6ca035e0e6707f30e9a480f8371f80de537bbadd688e24b89fbb624cc1fe739126b002469938051f5683218d335102a84d0bcfb75b0c398e930adc1a606613d7ffe938d2f7277939f450d4eae43af613b0c0340ab26cece2a77eb55c758b3b14e511c05b070dd7913e57ade34190d17345999c91597dc36cfa65559e39e4d6ba91e90485734a97022fc7aa51d2de22a802b2d3f1e2b53d982caebec8753dba46bbac7e2cb76c0255ca236166c22a9ce966ab16420254a9713266f9916f4e05d6f6c2fd6ef1e8d8a6ff052c7402c52cae16d08964d7575529bb480fe7beddad52ebf7220978c978a78d891d3f112aa056554ec5707536b6a27ce3340bd4f498909335fe6e20f21a638a6176d4b33facf45d272fb66635cc1338f513011be80104f6acbf00a8329835cafd97386a20d7a0d9ec74ebed02d190db1558909643ad344ca55cbb30ea2b1618842e164562d045caaf8dea14e68ea06b0bc5654828ec5e719db9bc1725a7d01ad0d561cfcb2972ad0f39016d22534b461971d601428af797db95e7477fe432c8e6970730433c52a8c9dedd00b6895101232bc62e3907151d12c392925f415164d21255479bf72f6ff6ed8c7d5521929067b33c2c9bca189b0a2deb7435c9b4e805581dcd9d1a3e5314399abe58166376345e414c5445b293dc04634d654454dcb736fb571aecd0491d94d15db25e57862c7bf813f9f16a6a4137f1852d55c8d2d1ea0e598ddd7345cd057fc0805a410c4c739d923b0cd0c6a032ad900ad4e84c0821ced5ce84cd1afa9e6c4a1f5e99dfc0cdd4c146eb0cce18d414b4d86ecff0fa5cdeca598ffe221a2cb3b1857ee30d3f6b7a83ca313cf60080645a94277844fbf40c84d9074fda2c7b223a4bde379b8d2da750336c5032af55d2496241a9de77a6a53703ead8036792e0f370fe774d9500f76d541b3c3be1acc60479f07db1e61e0001244cb7e5511d860f8f31f8c01a2e97d082b0ec413051e49a54e65ffa3e4af4dd0e0f0fb227ab775937a2c42a4da381f2a457ac175799bcd5556a462b2096211f7efc487567cde7287afd71039b7fbc290161987cb74a5c3d5018188af7933e12a0d3681570933a562e9e883fcc63495c5f54c446433c07689937595628b07662cee923a1500519f4f52490205befd0ac832160b43cf40725b2c6dc22ed0fdf0f619d404b9399494b6b7aebb334f621d352ea233420884db5cbf8f94474142eaa30ce8e5415b6f6aa16a7606d67fd0fe485ddfdec992d2364c281993522b587c837e4363ca79b32d52b032ccf27083cf8d438378d5012d3db1e9706fb6bab465a3da9e5ebb9cbb1bc832a5b79775b6628ed72ce45af1d34aba76f5cc9a58bfe5309f55deb7a41bf16eda03c796c144c475805a6eb481ee2e74d6a6baab144d3c53ef6f075f624aa736ea66b6956e6c46a1684195b38fa604669dc624325e0c7582030c18f6a43c7a16ef2a8704e23cfd9ecc97e72335c07702fd3868d87da30e6668db7e87fddea5f8f0cad8da479fcdaa8817cffb5b3527f494a0147674746fb89536a8e590e41c9841a4d089ee513d8f0cbf79173951e66a1244dbd9d434fbfa0d63ff049a058de101cf545b811a669b701952e96c356f17f0ee3689f26c2ce6942e8f87af57732b36c5169f30776ceb344a25f00bc401b43fb04172bf5c28688d26a41aa13c45949f1a44666e63f109b6a9fe67c2e1645e40b6f577d73e03f202d5ceac0c1477089eefad9e74dec31cf5a280d314c8b1168977ea410114b402220091e7e390263e5b4b800abb8a227e07b22d212bc392463dc58518756e7e8a6de797a78cf09ef7862ac7c71bdc14a090c71f1e14ede1c97beece6cb32f0cde8fc7b961daab53f12e3fdc42109dcd53e12a50f823cb33fc9c537de23d5997bc6e0f6e4bd9cdbdd6cba5d9cc72370485d11d011d8a54b91e19ca5349bdd07b4bc68d17824bdeb3d0529541a10e69f9f14751c732c4118f20569632df63e747552dab2e533a0c84c260f2f4f586fc355ffda0725ec822b2a099f8f4e69d206e86bf38035e85a07bb862fae491d4dd91560bc069ad9f7d990524336185a95907fdf19bea5ad62c83cfd4478c7447d68661d2e09e617e4261a0223142d9f7f151425f586cfa86421a6249556a5ac4d1a2f8869ad6921421410fafcb023abf212dfc1d666dc9dc478cc4ecf45dfaced8fc56b65141887bd6aa14ed52c42087000cb4f66f7fc339065bbbcd42848fb078a58c39fd7c3b4f091f2a98e8ebf08f4df1bcc3e889b342ca011e6253e8eb4e83fbfffe04c2fef2dd345a9df0d738d8e7b90791ea13a659056aa949a1ce3685bb6e48e2adb14d42c2e1b108ba6ebf441ccf62ccc5d9c4116a0980eb2f71797f3091cf6dfca689896100196375686869f6b4ca95a6850243e5baf4456982e237daaf7b4638503caf6b0a8efd3dd4b8c5d0d79fba0bc504b32c5e9ad4788fe3a010f477174484568f464473be0ad07fe174bd1b8f61684eb8f26e976538d0725064dc868c854978be87f659128ac72ab7ed392f1e2ab477cf5ab6e029f332709eb02ae3a51bcd30ab41a5cc7be26b3438d2cbff2b85fd4d9cf2df48049af139ee4b1d01567642948ceb1de433b78486a4657bc78dcae560cb75477b7518f3a67ab2ccf96ef009b576d4113ee3e86b5e5acc0e68e695ac4eee91d5ba8465b7f214ed884acfb10828933bcfe697170d82659299fe109c0e8bf896b40ff1e4fd7f5c1270b08c1cbdfc8f4466a6d36911aed316ed00dedb4880574638cbbe3d41da9f6d7b86e897c40f57fd03d4bf98b33fb3b32576095eba9c1b633b5d243fdfe222bfc11ff1813d8915424db4300658f2cbe76521234697be6213083465b200577b16d3bbbb01c031706b92088f5a1f6d92bfeb9cbe90e3ce193a405854f61b9c07494345f088d853f5685fda148b79dbc9a5ae1b7f9075a35c2e1079130756b30bbf339edfcae77c90fe9301794673e92b408d7c5ac371c9d6a64d66399d124957475e0162635dfa810c85f6477753b2c7a8aee95fdcbae6fc0299fe3341e31e375623c5ba281d272598a5c20c49853ff320a17eb94e75422feef69c291ca7befa0b1ed2fc8cd75e9418c04df8ddd58ccd4ece339915cf00c79063c9f9bc546032ce16eb05a1d93a5d8ba1d5bb96751ac259750c71fb3d1d15c2a64c768dce39fb21fb0823baabfd5ffc15441792fe24fff2218de4ca464ef41fc339e3a180d8235cb6d21dc9d02020632d6c1ace1a694d30e16862410403162b60d772113d5748423a32d40fcd933a24c83e9628afe16cdee8fe50b58c8b8053023353a36f19ebbe1dc55f04e605e9a1a1ce84e4873828c8dbc3004818a06efe95f83a4ab9c44d07c61a02a33c2f51cc0060f101c7ca3690777c2b17db2c5437edafea79e8f263f28c53052c0c6628a2cf14e09e761c0c03564e4bb875ba1a04e1aa5cfe83738a1022f8f5fce3012d4cd32a54ada24c2375d3ac9de1eca2d4dc943666eb84503e99473c24a3ca46d5d8cf46b2651bae2d4136fd81b1f0c7cb3345253a73888a084aa345be7924d058e4a83d64830f34cb94200ca43245a493130c062814115b366fa3aea9a2c7d6935bc596a2f55053ef105d94ae664a2767582eeca95ca9bad7c8b6caff26505c0019001f702551f00b6eb843908face8f77681ec7e750ad1a12dfdd9808d3fa1cece08333aab963a0050df400cf7c34918f2460781843b024efb8497c4c079890c0006245359b84b8338a385aae672556a922554570c9dce137ad66804046bd094b412013a6354b297110d0ce47ad06994391ce31c365281db40a13619333406b8ad065bf0d0e7aeb4188d7cbc66c5b9a87bb30dc767f6f9938176350ffadc6eaf59d2dbaeba9e4cf8ed82a619de89c7486ed60288959f53055006f0259ed9156071f5526fbfb27cabaac95d9433bb53bf4f80d1590c410a40ea671c987b90dabc546104e4fea1deaa04a23cc479a38e67f625be53f755822205fc633587a1a8b2082dea821f776b134dd527c53d43661ea66676ad3f5f4c120776dbfd3b8d0be50cba987f7c990ac3c2bae2a4c6dc34c09108ebd5bb83ba96b723fd0adc18e3ad065f60d59bee89323064e6d8c9c390b56dd7783690b0008ebe6a7895777aac7932d1bb7c07ee09adfc78261d908fec2497e865a5a97c4070b4d76d10cb80ba0a3608a0c7a36e7a4ab703a17e32d4a2054da640a5aa9535b67a328f20f8961785a8dba40e8f312c8a0bfea24deb2631a59c08bc5496ac013e854187d32545b2691882b6a1feb1acfe263b98", 0xfa4) 2018/04/21 01:53:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5437, &(0x7f0000981ffe)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) dup2(r1, r0) 2018/04/21 01:53:17 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5437, &(0x7f0000981ffe)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) dup2(r1, r0) 2018/04/21 01:53:18 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000c00)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) dup2(r0, r1) 2018/04/21 01:53:18 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x2000000000007, 0x0, 0xd000, 0x2000, &(0x7f000000b000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:53:18 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x80800) readv(r0, &(0x7f00009a4000)=[{&(0x7f000022c000)=""/32, 0x20}], 0x1) 2018/04/21 01:53:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000c00)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) dup2(r0, r1) 2018/04/21 01:53:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000078c0)={&(0x7f0000003d00)={0x10}, 0xc, &(0x7f0000007880)={&(0x7f00000063c0)=@newsa={0x13c, 0x10, 0x3, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xaa}, @in=@loopback=0x7f000001}, {@in6=@loopback={0x0, 0x1}, 0x0, 0x32}, @in=@loopback=0x7f000001, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x4c, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'F'}}]}, 0x13c}, 0x1}, 0x0) 2018/04/21 01:53:18 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000014000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0)=[{&(0x7f0000061000)=""/212, 0xd4}], 0x1, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x20020000}], 0x1}}], 0x48}, 0x0) 2018/04/21 01:53:18 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0xfffffffffffffffd, 0x16c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', 0x1}) 2018/04/21 01:53:18 executing program 0: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @local}, @in6}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, @in6=@remote={0xfe, 0x80, [], 0xbb}}, {0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000000000, 0x10b6}, {0x7fffffff}, 0x0, 0x6e6bb1}, {{@in=@broadcast=0xffffffff}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x8}}, 0xe8) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f00000004c0)) umount2(&(0x7f0000000040)='/\x00', 0x0) 2018/04/21 01:53:18 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0xfffffffffffffffd, 0x16c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', 0x1}) 2018/04/21 01:53:18 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000014000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0)=[{&(0x7f0000061000)=""/212, 0xd4}], 0x1, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x20020000}], 0x1}}], 0x48}, 0x0) 2018/04/21 01:53:18 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0xfffffffffffffffd, 0x16c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', 0x1}) 2018/04/21 01:53:18 executing program 0: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @local}, @in6}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, @in6=@remote={0xfe, 0x80, [], 0xbb}}, {0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000000000, 0x10b6}, {0x7fffffff}, 0x0, 0x6e6bb1}, {{@in=@broadcast=0xffffffff}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x8}}, 0xe8) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f00000004c0)) umount2(&(0x7f0000000040)='/\x00', 0x0) 2018/04/21 01:53:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000078c0)={&(0x7f0000003d00)={0x10}, 0xc, &(0x7f0000007880)={&(0x7f00000063c0)=@newsa={0x13c, 0x10, 0x3, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xaa}, @in=@loopback=0x7f000001}, {@in6=@loopback={0x0, 0x1}, 0x0, 0x32}, @in=@loopback=0x7f000001, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x4c, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'F'}}]}, 0x13c}, 0x1}, 0x0) 2018/04/21 01:53:19 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0xfffffffffffffffd, 0x16c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', 0x1}) 2018/04/21 01:53:19 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0xfffffffffffffffd, 0x16c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', 0x1}) 2018/04/21 01:53:19 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000014000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0)=[{&(0x7f0000061000)=""/212, 0xd4}], 0x1, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x20020000}], 0x1}}], 0x48}, 0x0) 2018/04/21 01:53:19 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x2000000000007, 0x0, 0xd000, 0x2000, &(0x7f000000b000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:53:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000078c0)={&(0x7f0000003d00)={0x10}, 0xc, &(0x7f0000007880)={&(0x7f00000063c0)=@newsa={0x13c, 0x10, 0x3, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xaa}, @in=@loopback=0x7f000001}, {@in6=@loopback={0x0, 0x1}, 0x0, 0x32}, @in=@loopback=0x7f000001, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x4c, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'F'}}]}, 0x13c}, 0x1}, 0x0) 2018/04/21 01:53:19 executing program 0: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @local}, @in6}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, @in6=@remote={0xfe, 0x80, [], 0xbb}}, {0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000000000, 0x10b6}, {0x7fffffff}, 0x0, 0x6e6bb1}, {{@in=@broadcast=0xffffffff}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x8}}, 0xe8) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f00000004c0)) umount2(&(0x7f0000000040)='/\x00', 0x0) 2018/04/21 01:53:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000c00)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) dup2(r0, r1) 2018/04/21 01:53:19 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000c00)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) dup2(r0, r1) 2018/04/21 01:53:19 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000014000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0)=[{&(0x7f0000061000)=""/212, 0xd4}], 0x1, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x20020000}], 0x1}}], 0x48}, 0x0) 2018/04/21 01:53:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000078c0)={&(0x7f0000003d00)={0x10}, 0xc, &(0x7f0000007880)={&(0x7f00000063c0)=@newsa={0x13c, 0x10, 0x3, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xaa}, @in=@loopback=0x7f000001}, {@in6=@loopback={0x0, 0x1}, 0x0, 0x32}, @in=@loopback=0x7f000001, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x4c, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'F'}}]}, 0x13c}, 0x1}, 0x0) 2018/04/21 01:53:19 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0xfffffffffffffffd, 0x16c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', 0x1}) 2018/04/21 01:53:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00001e3fa8)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(rfc4309(authenc(michael_mic-generic,chacha20-generic)))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 2018/04/21 01:53:19 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0xfffffffffffffffd, 0x16c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', 0x1}) 2018/04/21 01:53:19 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000005000)={0x13}) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc004ae0a, &(0x7f0000005000)=""/20) 2018/04/21 01:53:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x264, 0x0) fcntl$setstatus(r1, 0x4, 0x42402) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'\x00', {0x2, 0x0, @broadcast=0xffffffff}}) sendto$unix(r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000280)) 2018/04/21 01:53:19 executing program 3: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r0, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/04/21 01:53:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x50, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @in6=@dev={0xfe, 0x80}}}}, 0x50}, 0x1}, 0x0) 2018/04/21 01:53:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) ppoll(&(0x7f0000002300)=[{r0}, {}, {}], 0x3, &(0x7f0000002340), &(0x7f0000002380)={0x2}, 0x8) 2018/04/21 01:53:19 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000005000)={0x13}) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc004ae0a, &(0x7f0000005000)=""/20) [ 83.184524] IPVS: Unknown mcast interface: rose0 [ 83.228268] IPVS: Unknown mcast interface: rose0 2018/04/21 01:53:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00001e3fa8)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(rfc4309(authenc(michael_mic-generic,chacha20-generic)))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 2018/04/21 01:53:20 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x50, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @in6=@dev={0xfe, 0x80}}}}, 0x50}, 0x1}, 0x0) 2018/04/21 01:53:20 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000005000)={0x13}) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc004ae0a, &(0x7f0000005000)=""/20) 2018/04/21 01:53:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) ppoll(&(0x7f0000002300)=[{r0}, {}, {}], 0x3, &(0x7f0000002340), &(0x7f0000002380)={0x2}, 0x8) 2018/04/21 01:53:20 executing program 3: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r0, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/04/21 01:53:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x2, &(0x7f0000000000)={{0x100000000000}}, &(0x7f00000000c0)) 2018/04/21 01:53:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x264, 0x0) fcntl$setstatus(r1, 0x4, 0x42402) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'\x00', {0x2, 0x0, @broadcast=0xffffffff}}) sendto$unix(r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000280)) 2018/04/21 01:53:20 executing program 4: mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x28240, 0x0) fchdir(0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xe, 0xffffffffffffffff) socket$inet_sctp(0x2, 0x1, 0x84) 2018/04/21 01:53:20 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000005000)={0x13}) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc004ae0a, &(0x7f0000005000)=""/20) 2018/04/21 01:53:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x2, &(0x7f0000000000)={{0x100000000000}}, &(0x7f00000000c0)) [ 84.042745] IPVS: Unknown mcast interface: rose0 [ 84.054298] mmap: syz-executor4 (7056) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/21 01:53:20 executing program 3: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r0, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/04/21 01:53:20 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x50, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @in6=@dev={0xfe, 0x80}}}}, 0x50}, 0x1}, 0x0) 2018/04/21 01:53:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00001e3fa8)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(rfc4309(authenc(michael_mic-generic,chacha20-generic)))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 2018/04/21 01:53:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) ppoll(&(0x7f0000002300)=[{r0}, {}, {}], 0x3, &(0x7f0000002340), &(0x7f0000002380)={0x2}, 0x8) [ 84.194640] IPVS: Unknown mcast interface: rose0 2018/04/21 01:53:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) ppoll(&(0x7f0000002300)=[{r0}, {}, {}], 0x3, &(0x7f0000002340), &(0x7f0000002380)={0x2}, 0x8) 2018/04/21 01:53:21 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x2, &(0x7f0000000000)={{0x100000000000}}, &(0x7f00000000c0)) 2018/04/21 01:53:21 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x50, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @in6=@dev={0xfe, 0x80}}}}, 0x50}, 0x1}, 0x0) 2018/04/21 01:53:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00001e3fa8)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(rfc4309(authenc(michael_mic-generic,chacha20-generic)))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 2018/04/21 01:53:21 executing program 4: mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x28240, 0x0) fchdir(0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xe, 0xffffffffffffffff) socket$inet_sctp(0x2, 0x1, 0x84) 2018/04/21 01:53:21 executing program 3: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r0, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/04/21 01:53:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x264, 0x0) fcntl$setstatus(r1, 0x4, 0x42402) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'\x00', {0x2, 0x0, @broadcast=0xffffffff}}) sendto$unix(r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000280)) 2018/04/21 01:53:21 executing program 6: mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x28240, 0x0) fchdir(0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xe, 0xffffffffffffffff) socket$inet_sctp(0x2, 0x1, 0x84) [ 84.977489] IPVS: Unknown mcast interface: rose0 2018/04/21 01:53:21 executing program 0: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x80000000008, &(0x7f000012c000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) 2018/04/21 01:53:21 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='proc\x00', 0x0, &(0x7f00000005c0)) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/21 01:53:21 executing program 4: mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x28240, 0x0) fchdir(0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xe, 0xffffffffffffffff) socket$inet_sctp(0x2, 0x1, 0x84) 2018/04/21 01:53:21 executing program 6: mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x28240, 0x0) fchdir(0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xe, 0xffffffffffffffff) socket$inet_sctp(0x2, 0x1, 0x84) 2018/04/21 01:53:21 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x2, &(0x7f0000000000)={{0x100000000000}}, &(0x7f00000000c0)) 2018/04/21 01:53:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000010, 0x803, 0x0) write(r0, &(0x7f0000000080)="260000002a0029d10701c1eb448974000000040001000000000000000002000000000000e9ff", 0x26) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) 2018/04/21 01:53:21 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"6966623000329c8e0000ffffff000200", 0x140f}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) 2018/04/21 01:53:21 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='proc\x00', 0x0, &(0x7f00000005c0)) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/21 01:53:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000010, 0x803, 0x0) write(r0, &(0x7f0000000080)="260000002a0029d10701c1eb448974000000040001000000000000000002000000000000e9ff", 0x26) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) 2018/04/21 01:53:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x8b}]}) 2018/04/21 01:53:21 executing program 6: mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x28240, 0x0) fchdir(0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xe, 0xffffffffffffffff) socket$inet_sctp(0x2, 0x1, 0x84) 2018/04/21 01:53:22 executing program 4: mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x28240, 0x0) fchdir(0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xe, 0xffffffffffffffff) socket$inet_sctp(0x2, 0x1, 0x84) 2018/04/21 01:53:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='proc\x00', 0x0, &(0x7f00000005c0)) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/21 01:53:22 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"6966623000329c8e0000ffffff000200", 0x140f}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) 2018/04/21 01:53:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000010, 0x803, 0x0) write(r0, &(0x7f0000000080)="260000002a0029d10701c1eb448974000000040001000000000000000002000000000000e9ff", 0x26) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) 2018/04/21 01:53:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x8b}]}) 2018/04/21 01:53:22 executing program 6: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1=0xe0000001}, @igmp={0x12}}}}}, &(0x7f00003b5000)) 2018/04/21 01:53:22 executing program 0: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x80000000008, &(0x7f000012c000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) 2018/04/21 01:53:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x264, 0x0) fcntl$setstatus(r1, 0x4, 0x42402) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'\x00', {0x2, 0x0, @broadcast=0xffffffff}}) sendto$unix(r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000280)) 2018/04/21 01:53:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000010, 0x803, 0x0) write(r0, &(0x7f0000000080)="260000002a0029d10701c1eb448974000000040001000000000000000002000000000000e9ff", 0x26) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) 2018/04/21 01:53:22 executing program 6: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1=0xe0000001}, @igmp={0x12}}}}}, &(0x7f00003b5000)) 2018/04/21 01:53:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='proc\x00', 0x0, &(0x7f00000005c0)) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/21 01:53:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="120000004e001f0014f9f400000000000300", 0x12) 2018/04/21 01:53:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x8b}]}) 2018/04/21 01:53:22 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"6966623000329c8e0000ffffff000200", 0x140f}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) 2018/04/21 01:53:22 executing program 6: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1=0xe0000001}, @igmp={0x12}}}}}, &(0x7f00003b5000)) 2018/04/21 01:53:22 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nls={'nls', 0x3d, 'cp874'}, 0x2c}, {@nls={'nls', 0x3d, 'default'}, 0x2c}]}) 2018/04/21 01:53:22 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0xd9b, 0x4) 2018/04/21 01:53:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="120000004e001f0014f9f400000000000300", 0x12) 2018/04/21 01:53:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x8b}]}) 2018/04/21 01:53:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="120000004e001f0014f9f400000000000300", 0x12) 2018/04/21 01:53:22 executing program 6: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1=0xe0000001}, @igmp={0x12}}}}}, &(0x7f00003b5000)) [ 86.446353] hfsplus: unable to change nls mapping [ 86.451432] hfsplus: unable to parse mount options 2018/04/21 01:53:22 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0xd9b, 0x4) [ 86.519586] hfsplus: unable to change nls mapping [ 86.524560] hfsplus: unable to parse mount options 2018/04/21 01:53:23 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nls={'nls', 0x3d, 'cp874'}, 0x2c}, {@nls={'nls', 0x3d, 'default'}, 0x2c}]}) 2018/04/21 01:53:23 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) dup2(r0, r1) 2018/04/21 01:53:23 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"6966623000329c8e0000ffffff000200", 0x140f}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) 2018/04/21 01:53:23 executing program 0: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x80000000008, &(0x7f000012c000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) 2018/04/21 01:53:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="120000004e001f0014f9f400000000000300", 0x12) 2018/04/21 01:53:23 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0xd9b, 0x4) 2018/04/21 01:53:23 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000d40)={&(0x7f0000000a40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 2018/04/21 01:53:23 executing program 5: set_mempolicy(0x2000000002, &(0x7f0000000100)=0x1, 0x1f) mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0xfffffffffffffffd, 0x44031, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, &(0x7f00000001c0), 0x10) 2018/04/21 01:53:23 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file1\x00') [ 87.103804] hfsplus: unable to change nls mapping [ 87.108770] hfsplus: unable to parse mount options 2018/04/21 01:53:23 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0xd9b, 0x4) 2018/04/21 01:53:23 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000d40)={&(0x7f0000000a40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 2018/04/21 01:53:23 executing program 5: set_mempolicy(0x2000000002, &(0x7f0000000100)=0x1, 0x1f) mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0xfffffffffffffffd, 0x44031, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, &(0x7f00000001c0), 0x10) 2018/04/21 01:53:23 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nls={'nls', 0x3d, 'cp874'}, 0x2c}, {@nls={'nls', 0x3d, 'default'}, 0x2c}]}) [ 87.376228] hfsplus: unable to change nls mapping [ 87.381205] hfsplus: unable to parse mount options 2018/04/21 01:53:24 executing program 0: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x80000000008, &(0x7f000012c000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) 2018/04/21 01:53:24 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000d40)={&(0x7f0000000a40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 2018/04/21 01:53:24 executing program 7: r0 = getpid() r1 = gettid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)) 2018/04/21 01:53:24 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file1\x00') 2018/04/21 01:53:24 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nls={'nls', 0x3d, 'cp874'}, 0x2c}, {@nls={'nls', 0x3d, 'default'}, 0x2c}]}) 2018/04/21 01:53:24 executing program 5: set_mempolicy(0x2000000002, &(0x7f0000000100)=0x1, 0x1f) mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0xfffffffffffffffd, 0x44031, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, &(0x7f00000001c0), 0x10) 2018/04/21 01:53:24 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) dup2(r0, r1) 2018/04/21 01:53:24 executing program 3: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000e03000)=@generic={0x20000000000001e, "0103000000040000000000003300000000a979f31db30c7bcc790405c7bad62e0a63a632ed4938323273fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f67dcf160e7e592358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 2018/04/21 01:53:24 executing program 5: set_mempolicy(0x2000000002, &(0x7f0000000100)=0x1, 0x1f) mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0xfffffffffffffffd, 0x44031, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, &(0x7f00000001c0), 0x10) [ 88.058669] hfsplus: unable to change nls mapping [ 88.063614] hfsplus: unable to parse mount options 2018/04/21 01:53:24 executing program 3: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000e03000)=@generic={0x20000000000001e, "0103000000040000000000003300000000a979f31db30c7bcc790405c7bad62e0a63a632ed4938323273fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f67dcf160e7e592358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 2018/04/21 01:53:24 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:24 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000d40)={&(0x7f0000000a40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 2018/04/21 01:53:24 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file1\x00') 2018/04/21 01:53:24 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) dup2(r0, r1) 2018/04/21 01:53:25 executing program 3: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000e03000)=@generic={0x20000000000001e, "0103000000040000000000003300000000a979f31db30c7bcc790405c7bad62e0a63a632ed4938323273fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f67dcf160e7e592358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 2018/04/21 01:53:25 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect(r0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x20) 2018/04/21 01:53:25 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) dup2(r0, r1) 2018/04/21 01:53:25 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') write$cgroup_int(r0, &(0x7f0000000000)={[0x31, 0x35]}, 0x2) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/249, 0xf9}], 0x1, 0x0) 2018/04/21 01:53:25 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file1\x00') 2018/04/21 01:53:25 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:25 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:25 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) [ 89.035220] syz-executor6 (7351): /proc/7338/oom_adj is deprecated, please use /proc/7338/oom_score_adj instead. 2018/04/21 01:53:25 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:25 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect(r0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x20) 2018/04/21 01:53:25 executing program 3: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000e03000)=@generic={0x20000000000001e, "0103000000040000000000003300000000a979f31db30c7bcc790405c7bad62e0a63a632ed4938323273fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f67dcf160e7e592358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 2018/04/21 01:53:25 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:25 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:25 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') write$cgroup_int(r0, &(0x7f0000000000)={[0x31, 0x35]}, 0x2) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/249, 0xf9}], 0x1, 0x0) 2018/04/21 01:53:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') write$cgroup_int(r0, &(0x7f0000000000)={[0x31, 0x35]}, 0x2) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/249, 0xf9}], 0x1, 0x0) 2018/04/21 01:53:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:25 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "3c228f", 0x18, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[@srh={0x0, 0x0, 0x4, 0x0, 0x1, 0x4}], @dccp={{0x4e21, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bbf792", 0x0, "d21473"}}}}}}}, 0x0) 2018/04/21 01:53:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') write$cgroup_int(r0, &(0x7f0000000000)={[0x31, 0x35]}, 0x2) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/249, 0xf9}], 0x1, 0x0) 2018/04/21 01:53:25 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') write$cgroup_int(r0, &(0x7f0000000000)={[0x31, 0x35]}, 0x2) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/249, 0xf9}], 0x1, 0x0) 2018/04/21 01:53:25 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect(r0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x20) 2018/04/21 01:53:25 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:25 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:25 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:25 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "3c228f", 0x18, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[@srh={0x0, 0x0, 0x4, 0x0, 0x1, 0x4}], @dccp={{0x4e21, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bbf792", 0x0, "d21473"}}}}}}}, 0x0) 2018/04/21 01:53:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') write$cgroup_int(r0, &(0x7f0000000000)={[0x31, 0x35]}, 0x2) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/249, 0xf9}], 0x1, 0x0) 2018/04/21 01:53:25 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect(r0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x20) 2018/04/21 01:53:25 executing program 1: perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 2018/04/21 01:53:25 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(xtea-generic)\x00'}, 0x59) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003380)=[{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)="e29204adc2760a90ef45dba62ce59188", 0x10}], 0x1, &(0x7f00000016c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0xffffff6e}, 0x0) 2018/04/21 01:53:25 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') write$cgroup_int(r0, &(0x7f0000000000)={[0x31, 0x35]}, 0x2) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/249, 0xf9}], 0x1, 0x0) 2018/04/21 01:53:25 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "3c228f", 0x18, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[@srh={0x0, 0x0, 0x4, 0x0, 0x1, 0x4}], @dccp={{0x4e21, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bbf792", 0x0, "d21473"}}}}}}}, 0x0) 2018/04/21 01:53:26 executing program 4: socket$inet(0x2b, 0x8000000001, 0x4) 2018/04/21 01:53:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/21 01:53:26 executing program 1: perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 2018/04/21 01:53:26 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) dup3(r1, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x10, 0x0, &(0x7f0000015000)=[@request_death={0x400c630e}], 0x0, 0x0, &(0x7f0000016000)}) 2018/04/21 01:53:26 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f00000001c0)="470f01c9440f0766b8ca000f00d8b9620b00000f322626660f38823b0f06c744240094000000c744240266950000c7442406000000000f011424b9600200000f3266b8e0008ee866baf80cb852ae7b83ef66bafc0cec", 0x56}], 0x1, 0x78, &(0x7f0000000280), 0x0) syz_emit_ethernet(0x42, &(0x7f0000000180)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@rr={0x7, 0xb, 0x4, [@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 2018/04/21 01:53:26 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "3c228f", 0x18, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[@srh={0x0, 0x0, 0x4, 0x0, 0x1, 0x4}], @dccp={{0x4e21, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bbf792", 0x0, "d21473"}}}}}}}, 0x0) 2018/04/21 01:53:26 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(xtea-generic)\x00'}, 0x59) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003380)=[{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)="e29204adc2760a90ef45dba62ce59188", 0x10}], 0x1, &(0x7f00000016c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0xffffff6e}, 0x0) 2018/04/21 01:53:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000100)="9a22939e67cca29c916f9f955e984e3337bbb045a12f0d53283b037c745f01779ac1b2b83e124771023a33f7b032c48897f0bdb0bbdef3c3f38af741f2dde123d11a180daa90c68ce1b19a17b8fceefc64b94ef5ad8ce385", 0x58) [ 90.602623] binder: 7447:7450 BC_REQUEST_DEATH_NOTIFICATION death notification already set 2018/04/21 01:53:26 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(xtea-generic)\x00'}, 0x59) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003380)=[{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)="e29204adc2760a90ef45dba62ce59188", 0x10}], 0x1, &(0x7f00000016c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0xffffff6e}, 0x0) 2018/04/21 01:53:26 executing program 4: socket$inet(0x2b, 0x8000000001, 0x4) [ 90.653921] binder: 7447:7459 BC_REQUEST_DEATH_NOTIFICATION death notification already set 2018/04/21 01:53:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000100)="9a22939e67cca29c916f9f955e984e3337bbb045a12f0d53283b037c745f01779ac1b2b83e124771023a33f7b032c48897f0bdb0bbdef3c3f38af741f2dde123d11a180daa90c68ce1b19a17b8fceefc64b94ef5ad8ce385", 0x58) 2018/04/21 01:53:27 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x400442c9, &(0x7f0000000040)) 2018/04/21 01:53:27 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f00000001c0)="470f01c9440f0766b8ca000f00d8b9620b00000f322626660f38823b0f06c744240094000000c744240266950000c7442406000000000f011424b9600200000f3266b8e0008ee866baf80cb852ae7b83ef66bafc0cec", 0x56}], 0x1, 0x78, &(0x7f0000000280), 0x0) syz_emit_ethernet(0x42, &(0x7f0000000180)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@rr={0x7, 0xb, 0x4, [@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 2018/04/21 01:53:27 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) dup3(r1, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x10, 0x0, &(0x7f0000015000)=[@request_death={0x400c630e}], 0x0, 0x0, &(0x7f0000016000)}) 2018/04/21 01:53:27 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(xtea-generic)\x00'}, 0x59) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003380)=[{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)="e29204adc2760a90ef45dba62ce59188", 0x10}], 0x1, &(0x7f00000016c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0xffffff6e}, 0x0) 2018/04/21 01:53:27 executing program 4: socket$inet(0x2b, 0x8000000001, 0x4) 2018/04/21 01:53:27 executing program 1: perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 2018/04/21 01:53:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000000)=0x1, 0x4) syz_emit_ethernet(0x1f0, &(0x7f00003f3fd5)={@random="17ca660a423b", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/21 01:53:27 executing program 7: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) listen(r0, 0x11000000000f) r1 = accept(r0, &(0x7f0000317000)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r1, 0x4000100000002) [ 91.517472] binder: 7487:7490 BC_REQUEST_DEATH_NOTIFICATION death notification already set 2018/04/21 01:53:27 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) dup3(r1, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x10, 0x0, &(0x7f0000015000)=[@request_death={0x400c630e}], 0x0, 0x0, &(0x7f0000016000)}) 2018/04/21 01:53:27 executing program 4: socket$inet(0x2b, 0x8000000001, 0x4) 2018/04/21 01:53:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000000)=0x1, 0x4) syz_emit_ethernet(0x1f0, &(0x7f00003f3fd5)={@random="17ca660a423b", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/21 01:53:27 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x400442c9, &(0x7f0000000040)) 2018/04/21 01:53:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000100)="9a22939e67cca29c916f9f955e984e3337bbb045a12f0d53283b037c745f01779ac1b2b83e124771023a33f7b032c48897f0bdb0bbdef3c3f38af741f2dde123d11a180daa90c68ce1b19a17b8fceefc64b94ef5ad8ce385", 0x58) 2018/04/21 01:53:27 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f00000001c0)="470f01c9440f0766b8ca000f00d8b9620b00000f322626660f38823b0f06c744240094000000c744240266950000c7442406000000000f011424b9600200000f3266b8e0008ee866baf80cb852ae7b83ef66bafc0cec", 0x56}], 0x1, 0x78, &(0x7f0000000280), 0x0) syz_emit_ethernet(0x42, &(0x7f0000000180)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@rr={0x7, 0xb, 0x4, [@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) [ 91.642756] binder: 7496:7497 BC_REQUEST_DEATH_NOTIFICATION death notification already set 2018/04/21 01:53:27 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x400442c9, &(0x7f0000000040)) 2018/04/21 01:53:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000100)="9a22939e67cca29c916f9f955e984e3337bbb045a12f0d53283b037c745f01779ac1b2b83e124771023a33f7b032c48897f0bdb0bbdef3c3f38af741f2dde123d11a180daa90c68ce1b19a17b8fceefc64b94ef5ad8ce385", 0x58) 2018/04/21 01:53:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000000)=0x1, 0x4) syz_emit_ethernet(0x1f0, &(0x7f00003f3fd5)={@random="17ca660a423b", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/21 01:53:28 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x400442c9, &(0x7f0000000040)) 2018/04/21 01:53:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) dup3(r1, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x10, 0x0, &(0x7f0000015000)=[@request_death={0x400c630e}], 0x0, 0x0, &(0x7f0000016000)}) 2018/04/21 01:53:28 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x400442c9, &(0x7f0000000040)) 2018/04/21 01:53:28 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f00000001c0)="470f01c9440f0766b8ca000f00d8b9620b00000f322626660f38823b0f06c744240094000000c744240266950000c7442406000000000f011424b9600200000f3266b8e0008ee866baf80cb852ae7b83ef66bafc0cec", 0x56}], 0x1, 0x78, &(0x7f0000000280), 0x0) syz_emit_ethernet(0x42, &(0x7f0000000180)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@rr={0x7, 0xb, 0x4, [@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 2018/04/21 01:53:28 executing program 7: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) listen(r0, 0x11000000000f) r1 = accept(r0, &(0x7f0000317000)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r1, 0x4000100000002) 2018/04/21 01:53:28 executing program 1: perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 2018/04/21 01:53:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_emit_ethernet(0x11, &(0x7f0000000140)={@random="397a2de4de54", @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@x25={0x805}}}, &(0x7f00000001c0)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc1205531, &(0x7f000035dffc)) [ 92.672903] binder: 7543:7545 BC_REQUEST_DEATH_NOTIFICATION death notification already set 2018/04/21 01:53:28 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x400442c9, &(0x7f0000000040)) 2018/04/21 01:53:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000000)=0x1, 0x4) syz_emit_ethernet(0x1f0, &(0x7f00003f3fd5)={@random="17ca660a423b", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/21 01:53:28 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x400442c9, &(0x7f0000000040)) 2018/04/21 01:53:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="0f7f89dc3b"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:53:29 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x402180, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x9, 0x4, 0x6, 0x40}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x2, 0x9}, 0xc) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x3ff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000614ffc)=0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000240)=0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000254000)='attr\x00') r4 = perf_event_open(&(0x7f0000ac4000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x45c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000c59000), &(0x7f000079b000)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syslog(0x9, &(0x7f0000000040)=""/135, 0x87) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000100)) futimesat(r3, &(0x7f0000000140)='./control\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000c9dfe0)={0x6001, 0x6, 0x2, 0x14cb8980, 0x1000, 0x0, 0x4, 0x3, 0x0}, &(0x7f000099f000)=0x20) ioctl$sock_ipx_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000200)={"8c72cbeff26c5c0c7155cb2f65c08eec", {0x4, 0xffffffff, 0x2, "020200000700", 0x80000010001}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000decf74)={r6, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}}, 0x8c) chroot(&(0x7f0000539000)='./control\x00') setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f000039fffc)=0x400000000000001, 0x4) connect$unix(r5, &(0x7f0000ac7ff8)=@abs, 0x8) bind$inet(r5, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r5, &(0x7f00008c0f4c)="50000021066b557b9c270d06c9b7a145dbdff821426a925c9579ca3e74fe5ed44fe628292f37404aa359f4d8a46980726b63db4baefd5d2dd62419decca07a6870f480699a53ca2437301ecbde036e1ccf718ba9b5ec9956b6b17efffa9458708a44b14ffe990715c65a52cab937f0ece99df430a7ac6b897781b1dbe8e11ab3a12af1c87ec36f53c18c37097a3b211780ee528b4d227a90ecfddb67c1c62367cc21a6a3d8319a1cbd82e6f8f1206a401de31586", 0xb4, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x852b, 0xfffffffffffffffe}, 0x14) shutdown(r5, 0x2) 2018/04/21 01:53:29 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)=ANY=[@ANYBLOB="020d00001800000000000000000000000400040000000002000000000000080000000000000000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac140000000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xc0}, 0x1}, 0x0) 2018/04/21 01:53:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000040)=""/33) 2018/04/21 01:53:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x40087446, 0x705000, &(0x7f0000000080)) 2018/04/21 01:53:29 executing program 4: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x4, 0x0, [0x20000500, 0x0, 0x0, 0x20000628, 0x20000910], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[]}, 0x78) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x1a1, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/04/21 01:53:29 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)=ANY=[@ANYBLOB="020d00001800000000000000000000000400040000000002000000000000080000000000000000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac140000000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xc0}, 0x1}, 0x0) 2018/04/21 01:53:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000040)=""/33) 2018/04/21 01:53:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="0f7f89dc3b"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:53:29 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)=ANY=[@ANYBLOB="020d00001800000000000000000000000400040000000002000000000000080000000000000000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac140000000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xc0}, 0x1}, 0x0) 2018/04/21 01:53:29 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x402180, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x9, 0x4, 0x6, 0x40}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x2, 0x9}, 0xc) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x3ff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000614ffc)=0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000240)=0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000254000)='attr\x00') r4 = perf_event_open(&(0x7f0000ac4000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x45c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000c59000), &(0x7f000079b000)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syslog(0x9, &(0x7f0000000040)=""/135, 0x87) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000100)) futimesat(r3, &(0x7f0000000140)='./control\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000c9dfe0)={0x6001, 0x6, 0x2, 0x14cb8980, 0x1000, 0x0, 0x4, 0x3, 0x0}, &(0x7f000099f000)=0x20) ioctl$sock_ipx_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000200)={"8c72cbeff26c5c0c7155cb2f65c08eec", {0x4, 0xffffffff, 0x2, "020200000700", 0x80000010001}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000decf74)={r6, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}}, 0x8c) chroot(&(0x7f0000539000)='./control\x00') setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f000039fffc)=0x400000000000001, 0x4) connect$unix(r5, &(0x7f0000ac7ff8)=@abs, 0x8) bind$inet(r5, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r5, &(0x7f00008c0f4c)="50000021066b557b9c270d06c9b7a145dbdff821426a925c9579ca3e74fe5ed44fe628292f37404aa359f4d8a46980726b63db4baefd5d2dd62419decca07a6870f480699a53ca2437301ecbde036e1ccf718ba9b5ec9956b6b17efffa9458708a44b14ffe990715c65a52cab937f0ece99df430a7ac6b897781b1dbe8e11ab3a12af1c87ec36f53c18c37097a3b211780ee528b4d227a90ecfddb67c1c62367cc21a6a3d8319a1cbd82e6f8f1206a401de31586", 0xb4, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x852b, 0xfffffffffffffffe}, 0x14) shutdown(r5, 0x2) 2018/04/21 01:53:29 executing program 4: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x4, 0x0, [0x20000500, 0x0, 0x0, 0x20000628, 0x20000910], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[]}, 0x78) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x1a1, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/04/21 01:53:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000040)=""/33) 2018/04/21 01:53:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="0f7f89dc3b"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:53:29 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)=ANY=[@ANYBLOB="020d00001800000000000000000000000400040000000002000000000000080000000000000000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac140000000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xc0}, 0x1}, 0x0) 2018/04/21 01:53:29 executing program 7: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) listen(r0, 0x11000000000f) r1 = accept(r0, &(0x7f0000317000)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r1, 0x4000100000002) 2018/04/21 01:53:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x40087446, 0x705000, &(0x7f0000000080)) 2018/04/21 01:53:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000040)=""/33) 2018/04/21 01:53:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="0f7f89dc3b"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:53:29 executing program 4: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x4, 0x0, [0x20000500, 0x0, 0x0, 0x20000628, 0x20000910], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[]}, 0x78) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f21298055806494ee0e961cd5bd077bd7756f9e39dd3abdbe5c598cc5cbd44c5c319af923fbc4731545ff134749c2f42ee8454bf33ef309a6323dc847676d5be2fcb9abc717fc1e29396943ec0e264a80d64ca66ef2c42a57112a8a146097d9f4256ef6e6fd73be26e9a5f79b21dae42066d9cf4441021d64a2d6fd61c7ea709948d4be380e0fa4b76dff6aeef45", 0x1a1, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/04/21 01:53:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x40087446, 0x705000, &(0x7f0000000080)) 2018/04/21 01:53:30 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x402180, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x9, 0x4, 0x6, 0x40}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x2, 0x9}, 0xc) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x3ff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000614ffc)=0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000240)=0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000254000)='attr\x00') r4 = perf_event_open(&(0x7f0000ac4000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x45c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000c59000), &(0x7f000079b000)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syslog(0x9, &(0x7f0000000040)=""/135, 0x87) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000100)) futimesat(r3, &(0x7f0000000140)='./control\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000c9dfe0)={0x6001, 0x6, 0x2, 0x14cb8980, 0x1000, 0x0, 0x4, 0x3, 0x0}, &(0x7f000099f000)=0x20) ioctl$sock_ipx_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000200)={"8c72cbeff26c5c0c7155cb2f65c08eec", {0x4, 0xffffffff, 0x2, "020200000700", 0x80000010001}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000decf74)={r6, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}}, 0x8c) chroot(&(0x7f0000539000)='./control\x00') setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f000039fffc)=0x400000000000001, 0x4) connect$unix(r5, &(0x7f0000ac7ff8)=@abs, 0x8) bind$inet(r5, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r5, &(0x7f00008c0f4c)="50000021066b557b9c270d06c9b7a145dbdff821426a925c9579ca3e74fe5ed44fe628292f37404aa359f4d8a46980726b63db4baefd5d2dd62419decca07a6870f480699a53ca2437301ecbde036e1ccf718ba9b5ec9956b6b17efffa9458708a44b14ffe990715c65a52cab937f0ece99df430a7ac6b897781b1dbe8e11ab3a12af1c87ec36f53c18c37097a3b211780ee528b4d227a90ecfddb67c1c62367cc21a6a3d8319a1cbd82e6f8f1206a401de31586", 0xb4, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x852b, 0xfffffffffffffffe}, 0x14) shutdown(r5, 0x2) 2018/04/21 01:53:30 executing program 4: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x4, 0x0, [0x20000500, 0x0, 0x0, 0x20000628, 0x20000910], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[]}, 0x78) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f21298055806494ee0e961cd5bd077bd7756f9e39dd3abdbe5c598cc5cbd44c5c319af923fbc4731545ff134749c2f42ee8454bf33ef309a6323dc847676d5be2fcb9abc717fc1e29396943ec0e264a80d64ca66ef2c42a57112a8a146097d9f4256ef6e6fd73be26e9a5f79b21dae42066d9cf4441021d64a2d6fd61c7ea709948d4be380e0fa4b76dff6aeef45", 0x1a1, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/04/21 01:53:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x40087446, 0x705000, &(0x7f0000000080)) 2018/04/21 01:53:30 executing program 7: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) listen(r0, 0x11000000000f) r1 = accept(r0, &(0x7f0000317000)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r1, 0x4000100000002) 2018/04/21 01:53:30 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x402180, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x9, 0x4, 0x6, 0x40}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x2, 0x9}, 0xc) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x3ff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000614ffc)=0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000240)=0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000254000)='attr\x00') r4 = perf_event_open(&(0x7f0000ac4000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x45c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000c59000), &(0x7f000079b000)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syslog(0x9, &(0x7f0000000040)=""/135, 0x87) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000100)) futimesat(r3, &(0x7f0000000140)='./control\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000c9dfe0)={0x6001, 0x6, 0x2, 0x14cb8980, 0x1000, 0x0, 0x4, 0x3, 0x0}, &(0x7f000099f000)=0x20) ioctl$sock_ipx_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000200)={"8c72cbeff26c5c0c7155cb2f65c08eec", {0x4, 0xffffffff, 0x2, "020200000700", 0x80000010001}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000decf74)={r6, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}}, 0x8c) chroot(&(0x7f0000539000)='./control\x00') setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f000039fffc)=0x400000000000001, 0x4) connect$unix(r5, &(0x7f0000ac7ff8)=@abs, 0x8) bind$inet(r5, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r5, &(0x7f00008c0f4c)="50000021066b557b9c270d06c9b7a145dbdff821426a925c9579ca3e74fe5ed44fe628292f37404aa359f4d8a46980726b63db4baefd5d2dd62419decca07a6870f480699a53ca2437301ecbde036e1ccf718ba9b5ec9956b6b17efffa9458708a44b14ffe990715c65a52cab937f0ece99df430a7ac6b897781b1dbe8e11ab3a12af1c87ec36f53c18c37097a3b211780ee528b4d227a90ecfddb67c1c62367cc21a6a3d8319a1cbd82e6f8f1206a401de31586", 0xb4, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x852b, 0xfffffffffffffffe}, 0x14) shutdown(r5, 0x2) [ 94.647900] random: crng init done 2018/04/21 01:53:31 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x402180, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x9, 0x4, 0x6, 0x40}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x2, 0x9}, 0xc) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x3ff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000614ffc)=0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000240)=0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000254000)='attr\x00') r4 = perf_event_open(&(0x7f0000ac4000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x45c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000c59000), &(0x7f000079b000)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syslog(0x9, &(0x7f0000000040)=""/135, 0x87) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000100)) futimesat(r3, &(0x7f0000000140)='./control\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000c9dfe0)={0x6001, 0x6, 0x2, 0x14cb8980, 0x1000, 0x0, 0x4, 0x3, 0x0}, &(0x7f000099f000)=0x20) ioctl$sock_ipx_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000200)={"8c72cbeff26c5c0c7155cb2f65c08eec", {0x4, 0xffffffff, 0x2, "020200000700", 0x80000010001}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000decf74)={r6, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}}, 0x8c) chroot(&(0x7f0000539000)='./control\x00') setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f000039fffc)=0x400000000000001, 0x4) connect$unix(r5, &(0x7f0000ac7ff8)=@abs, 0x8) bind$inet(r5, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r5, &(0x7f00008c0f4c)="50000021066b557b9c270d06c9b7a145dbdff821426a925c9579ca3e74fe5ed44fe628292f37404aa359f4d8a46980726b63db4baefd5d2dd62419decca07a6870f480699a53ca2437301ecbde036e1ccf718ba9b5ec9956b6b17efffa9458708a44b14ffe990715c65a52cab937f0ece99df430a7ac6b897781b1dbe8e11ab3a12af1c87ec36f53c18c37097a3b211780ee528b4d227a90ecfddb67c1c62367cc21a6a3d8319a1cbd82e6f8f1206a401de31586", 0xb4, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x852b, 0xfffffffffffffffe}, 0x14) shutdown(r5, 0x2) 2018/04/21 01:53:31 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000340)=@req={0x28, &(0x7f0000000300)={'syz_tun\x00', @ifru_data=&(0x7f00000002c0)="1147377c1722512a38f8a103907a1f907bd6243241ef542a274486e8d14fd5e9"}}) 2018/04/21 01:53:31 executing program 4: setrlimit(0x40000000000008, &(0x7f00000a3ff0)={0x23, 0x100000000020}) r0 = socket(0x40000000015, 0x5, 0x0) mlock2(&(0x7f0000912000/0x3000)=nil, 0x3000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) mlock(&(0x7f0000914000/0x2000)=nil, 0x2000) 2018/04/21 01:53:31 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f0000000000), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'gre0\x00', 'rose0\x00', 'dummy0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xe0, 0xe0, 0x118, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x0, 0x0, 0x1}}}, @m802_3={'802_3\x00', 0x8}]}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x250) 2018/04/21 01:53:31 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000340)=@req={0x28, &(0x7f0000000300)={'syz_tun\x00', @ifru_data=&(0x7f00000002c0)="1147377c1722512a38f8a103907a1f907bd6243241ef542a274486e8d14fd5e9"}}) 2018/04/21 01:53:31 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f0000000000), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'gre0\x00', 'rose0\x00', 'dummy0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xe0, 0xe0, 0x118, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x0, 0x0, 0x1}}}, @m802_3={'802_3\x00', 0x8}]}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x250) 2018/04/21 01:53:31 executing program 4: setrlimit(0x40000000000008, &(0x7f00000a3ff0)={0x23, 0x100000000020}) r0 = socket(0x40000000015, 0x5, 0x0) mlock2(&(0x7f0000912000/0x3000)=nil, 0x3000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) mlock(&(0x7f0000914000/0x2000)=nil, 0x2000) 2018/04/21 01:53:31 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x402180, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x9, 0x4, 0x6, 0x40}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x2, 0x9}, 0xc) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x3ff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000614ffc)=0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000240)=0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000254000)='attr\x00') r4 = perf_event_open(&(0x7f0000ac4000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x45c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000c59000), &(0x7f000079b000)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syslog(0x9, &(0x7f0000000040)=""/135, 0x87) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000100)) futimesat(r3, &(0x7f0000000140)='./control\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000c9dfe0)={0x6001, 0x6, 0x2, 0x14cb8980, 0x1000, 0x0, 0x4, 0x3, 0x0}, &(0x7f000099f000)=0x20) ioctl$sock_ipx_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000200)={"8c72cbeff26c5c0c7155cb2f65c08eec", {0x4, 0xffffffff, 0x2, "020200000700", 0x80000010001}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000decf74)={r6, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}}, 0x8c) chroot(&(0x7f0000539000)='./control\x00') setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f000039fffc)=0x400000000000001, 0x4) connect$unix(r5, &(0x7f0000ac7ff8)=@abs, 0x8) bind$inet(r5, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r5, &(0x7f00008c0f4c)="50000021066b557b9c270d06c9b7a145dbdff821426a925c9579ca3e74fe5ed44fe628292f37404aa359f4d8a46980726b63db4baefd5d2dd62419decca07a6870f480699a53ca2437301ecbde036e1ccf718ba9b5ec9956b6b17efffa9458708a44b14ffe990715c65a52cab937f0ece99df430a7ac6b897781b1dbe8e11ab3a12af1c87ec36f53c18c37097a3b211780ee528b4d227a90ecfddb67c1c62367cc21a6a3d8319a1cbd82e6f8f1206a401de31586", 0xb4, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x852b, 0xfffffffffffffffe}, 0x14) shutdown(r5, 0x2) 2018/04/21 01:53:31 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f0000000000), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'gre0\x00', 'rose0\x00', 'dummy0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xe0, 0xe0, 0x118, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x0, 0x0, 0x1}}}, @m802_3={'802_3\x00', 0x8}]}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x250) 2018/04/21 01:53:31 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000340)=@req={0x28, &(0x7f0000000300)={'syz_tun\x00', @ifru_data=&(0x7f00000002c0)="1147377c1722512a38f8a103907a1f907bd6243241ef542a274486e8d14fd5e9"}}) 2018/04/21 01:53:31 executing program 4: setrlimit(0x40000000000008, &(0x7f00000a3ff0)={0x23, 0x100000000020}) r0 = socket(0x40000000015, 0x5, 0x0) mlock2(&(0x7f0000912000/0x3000)=nil, 0x3000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) mlock(&(0x7f0000914000/0x2000)=nil, 0x2000) 2018/04/21 01:53:32 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x402180, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x9, 0x4, 0x6, 0x40}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x2, 0x9}, 0xc) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x3ff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000614ffc)=0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000240)=0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000254000)='attr\x00') r4 = perf_event_open(&(0x7f0000ac4000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x45c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000c59000), &(0x7f000079b000)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syslog(0x9, &(0x7f0000000040)=""/135, 0x87) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000100)) futimesat(r3, &(0x7f0000000140)='./control\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000c9dfe0)={0x6001, 0x6, 0x2, 0x14cb8980, 0x1000, 0x0, 0x4, 0x3, 0x0}, &(0x7f000099f000)=0x20) ioctl$sock_ipx_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000200)={"8c72cbeff26c5c0c7155cb2f65c08eec", {0x4, 0xffffffff, 0x2, "020200000700", 0x80000010001}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000decf74)={r6, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}}, 0x8c) chroot(&(0x7f0000539000)='./control\x00') setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f000039fffc)=0x400000000000001, 0x4) connect$unix(r5, &(0x7f0000ac7ff8)=@abs, 0x8) bind$inet(r5, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r5, &(0x7f00008c0f4c)="50000021066b557b9c270d06c9b7a145dbdff821426a925c9579ca3e74fe5ed44fe628292f37404aa359f4d8a46980726b63db4baefd5d2dd62419decca07a6870f480699a53ca2437301ecbde036e1ccf718ba9b5ec9956b6b17efffa9458708a44b14ffe990715c65a52cab937f0ece99df430a7ac6b897781b1dbe8e11ab3a12af1c87ec36f53c18c37097a3b211780ee528b4d227a90ecfddb67c1c62367cc21a6a3d8319a1cbd82e6f8f1206a401de31586", 0xb4, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x852b, 0xfffffffffffffffe}, 0x14) shutdown(r5, 0x2) 2018/04/21 01:53:32 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f0000000000), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'gre0\x00', 'rose0\x00', 'dummy0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xe0, 0xe0, 0x118, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x0, 0x0, 0x1}}}, @m802_3={'802_3\x00', 0x8}]}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x250) 2018/04/21 01:53:32 executing program 4: setrlimit(0x40000000000008, &(0x7f00000a3ff0)={0x23, 0x100000000020}) r0 = socket(0x40000000015, 0x5, 0x0) mlock2(&(0x7f0000912000/0x3000)=nil, 0x3000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) mlock(&(0x7f0000914000/0x2000)=nil, 0x2000) 2018/04/21 01:53:32 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000340)=@req={0x28, &(0x7f0000000300)={'syz_tun\x00', @ifru_data=&(0x7f00000002c0)="1147377c1722512a38f8a103907a1f907bd6243241ef542a274486e8d14fd5e9"}}) 2018/04/21 01:53:32 executing program 0: setrlimit(0x40000000000008, &(0x7f00000a3ff0)={0x23, 0x100000000020}) r0 = socket(0x40000000015, 0x5, 0x0) mlock2(&(0x7f0000912000/0x3000)=nil, 0x3000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) mlock(&(0x7f0000914000/0x2000)=nil, 0x2000) 2018/04/21 01:53:32 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f00000000c0), &(0x7f0000012ffc)=0x4) 2018/04/21 01:53:32 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "0183d9dfda6321b6d7c21885478d97f1a61cb97063820c2875ceb558afd735b5d824e8d6aea962413a4e817be448738ef4a9c996e6955145ef3a1ec83e72a1"}, 0x60) getsockopt$bt_BT_RCVMTU(r0, 0x118, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x2) 2018/04/21 01:53:32 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000800)={@link_local={0x1, 0x80, 0xc2}, @empty, [{[], {0x8100, 0x2, 0x0, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, '\'jY', 0x44, 0x0, 0x0, @empty, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/21 01:53:32 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)='task\x00') getdents64(r0, &(0x7f0000003000)=""/48, 0x30) getdents(r0, &(0x7f0000000080)=""/34, 0x22) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 2018/04/21 01:53:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) ioctl(r0, 0x2286, &(0x7f0000c95ffe)) 2018/04/21 01:53:32 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x20000007fc, 0x200000000007ff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0x102, 0x1, 0x0, 0xffffffffffffffff}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) r3 = dup2(r1, r1) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000001500)="d02f15b7aa99e3001046ec93946e00983d52c36705a8849a70fc109ecc92872c8816ed6da3ed31892ed9f8659adae1db44c429533fad08f2557bfaad5256fe3cc8a88693a0fb2e74208c960c691a9084c69abb73af2744322673378467fd63f5afd8e5676f81def8a11409284b75c189737815799a3984926f72a791827715244d03b522c743b6c7a4442b5831696a990bc59fac43b32ebdae3920994585be13cbb02d8bb30060633ba6f8141e75ec863b0045dc29fd792023ed2851570080449036aa7127b5049b881a042b") 2018/04/21 01:53:32 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) writev(r0, &(0x7f0000553000)=[{&(0x7f0000c0c000)="580000001400190000bb4b01040d8c56020600000000e076489643d818fe58a2bc4a0381001dffffffff0000000006007ffff51000174100005bffff001ce1ed900000000000000006b736231be86efd121f00ec6b0f536e", 0x58}], 0x1) 2018/04/21 01:53:33 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000800)={@link_local={0x1, 0x80, 0xc2}, @empty, [{[], {0x8100, 0x2, 0x0, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, '\'jY', 0x44, 0x0, 0x0, @empty, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/21 01:53:33 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f00000000c0), &(0x7f0000012ffc)=0x4) 2018/04/21 01:53:33 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "0183d9dfda6321b6d7c21885478d97f1a61cb97063820c2875ceb558afd735b5d824e8d6aea962413a4e817be448738ef4a9c996e6955145ef3a1ec83e72a1"}, 0x60) getsockopt$bt_BT_RCVMTU(r0, 0x118, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x2) [ 96.825112] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 2018/04/21 01:53:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) writev(r0, &(0x7f0000553000)=[{&(0x7f0000c0c000)="580000001400190000bb4b01040d8c56020600000000e076489643d818fe58a2bc4a0381001dffffffff0000000006007ffff51000174100005bffff001ce1ed900000000000000006b736231be86efd121f00ec6b0f536e", 0x58}], 0x1) 2018/04/21 01:53:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) ioctl(r0, 0x2286, &(0x7f0000c95ffe)) 2018/04/21 01:53:33 executing program 0: setrlimit(0x40000000000008, &(0x7f00000a3ff0)={0x23, 0x100000000020}) r0 = socket(0x40000000015, 0x5, 0x0) mlock2(&(0x7f0000912000/0x3000)=nil, 0x3000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) mlock(&(0x7f0000914000/0x2000)=nil, 0x2000) 2018/04/21 01:53:33 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)='task\x00') getdents64(r0, &(0x7f0000003000)=""/48, 0x30) getdents(r0, &(0x7f0000000080)=""/34, 0x22) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 2018/04/21 01:53:33 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x20000007fc, 0x200000000007ff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0x102, 0x1, 0x0, 0xffffffffffffffff}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) r3 = dup2(r1, r1) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000001500)="d02f15b7aa99e3001046ec93946e00983d52c36705a8849a70fc109ecc92872c8816ed6da3ed31892ed9f8659adae1db44c429533fad08f2557bfaad5256fe3cc8a88693a0fb2e74208c960c691a9084c69abb73af2744322673378467fd63f5afd8e5676f81def8a11409284b75c189737815799a3984926f72a791827715244d03b522c743b6c7a4442b5831696a990bc59fac43b32ebdae3920994585be13cbb02d8bb30060633ba6f8141e75ec863b0045dc29fd792023ed2851570080449036aa7127b5049b881a042b") 2018/04/21 01:53:33 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000800)={@link_local={0x1, 0x80, 0xc2}, @empty, [{[], {0x8100, 0x2, 0x0, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, '\'jY', 0x44, 0x0, 0x0, @empty, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/21 01:53:33 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f00000000c0), &(0x7f0000012ffc)=0x4) 2018/04/21 01:53:33 executing program 0: setrlimit(0x40000000000008, &(0x7f00000a3ff0)={0x23, 0x100000000020}) r0 = socket(0x40000000015, 0x5, 0x0) mlock2(&(0x7f0000912000/0x3000)=nil, 0x3000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) mlock(&(0x7f0000914000/0x2000)=nil, 0x2000) 2018/04/21 01:53:33 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "0183d9dfda6321b6d7c21885478d97f1a61cb97063820c2875ceb558afd735b5d824e8d6aea962413a4e817be448738ef4a9c996e6955145ef3a1ec83e72a1"}, 0x60) getsockopt$bt_BT_RCVMTU(r0, 0x118, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x2) 2018/04/21 01:53:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) writev(r0, &(0x7f0000553000)=[{&(0x7f0000c0c000)="580000001400190000bb4b01040d8c56020600000000e076489643d818fe58a2bc4a0381001dffffffff0000000006007ffff51000174100005bffff001ce1ed900000000000000006b736231be86efd121f00ec6b0f536e", 0x58}], 0x1) 2018/04/21 01:53:33 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)='task\x00') getdents64(r0, &(0x7f0000003000)=""/48, 0x30) getdents(r0, &(0x7f0000000080)=""/34, 0x22) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 2018/04/21 01:53:33 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x20000007fc, 0x200000000007ff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0x102, 0x1, 0x0, 0xffffffffffffffff}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) r3 = dup2(r1, r1) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000001500)="d02f15b7aa99e3001046ec93946e00983d52c36705a8849a70fc109ecc92872c8816ed6da3ed31892ed9f8659adae1db44c429533fad08f2557bfaad5256fe3cc8a88693a0fb2e74208c960c691a9084c69abb73af2744322673378467fd63f5afd8e5676f81def8a11409284b75c189737815799a3984926f72a791827715244d03b522c743b6c7a4442b5831696a990bc59fac43b32ebdae3920994585be13cbb02d8bb30060633ba6f8141e75ec863b0045dc29fd792023ed2851570080449036aa7127b5049b881a042b") 2018/04/21 01:53:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) ioctl(r0, 0x2286, &(0x7f0000c95ffe)) 2018/04/21 01:53:33 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000800)={@link_local={0x1, 0x80, 0xc2}, @empty, [{[], {0x8100, 0x2, 0x0, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, '\'jY', 0x44, 0x0, 0x0, @empty, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/21 01:53:33 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "0183d9dfda6321b6d7c21885478d97f1a61cb97063820c2875ceb558afd735b5d824e8d6aea962413a4e817be448738ef4a9c996e6955145ef3a1ec83e72a1"}, 0x60) getsockopt$bt_BT_RCVMTU(r0, 0x118, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x2) 2018/04/21 01:53:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)='task\x00') getdents64(r0, &(0x7f0000003000)=""/48, 0x30) getdents(r0, &(0x7f0000000080)=""/34, 0x22) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 2018/04/21 01:53:33 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f00000000c0), &(0x7f0000012ffc)=0x4) 2018/04/21 01:53:33 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)='task\x00') getdents64(r0, &(0x7f0000003000)=""/48, 0x30) getdents(r0, &(0x7f0000000080)=""/34, 0x22) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 2018/04/21 01:53:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) writev(r0, &(0x7f0000553000)=[{&(0x7f0000c0c000)="580000001400190000bb4b01040d8c56020600000000e076489643d818fe58a2bc4a0381001dffffffff0000000006007ffff51000174100005bffff001ce1ed900000000000000006b736231be86efd121f00ec6b0f536e", 0x58}], 0x1) 2018/04/21 01:53:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) ioctl(r0, 0x2286, &(0x7f0000c95ffe)) 2018/04/21 01:53:33 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x20000007fc, 0x200000000007ff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0x102, 0x1, 0x0, 0xffffffffffffffff}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) r3 = dup2(r1, r1) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000001500)="d02f15b7aa99e3001046ec93946e00983d52c36705a8849a70fc109ecc92872c8816ed6da3ed31892ed9f8659adae1db44c429533fad08f2557bfaad5256fe3cc8a88693a0fb2e74208c960c691a9084c69abb73af2744322673378467fd63f5afd8e5676f81def8a11409284b75c189737815799a3984926f72a791827715244d03b522c743b6c7a4442b5831696a990bc59fac43b32ebdae3920994585be13cbb02d8bb30060633ba6f8141e75ec863b0045dc29fd792023ed2851570080449036aa7127b5049b881a042b") 2018/04/21 01:53:33 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000001080)={0x0, 0x3, 0x0, 0x0, 0x1, [{}]}) 2018/04/21 01:53:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)='task\x00') getdents64(r0, &(0x7f0000003000)=""/48, 0x30) getdents(r0, &(0x7f0000000080)=""/34, 0x22) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 2018/04/21 01:53:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)='task\x00') getdents64(r0, &(0x7f0000003000)=""/48, 0x30) getdents(r0, &(0x7f0000000080)=""/34, 0x22) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 2018/04/21 01:53:33 executing program 6: syz_emit_ethernet(0x7e, &(0x7f0000000800)={@link_local={0x1, 0x80, 0xc2}, @empty, [{[], {0x8100, 0x2, 0x0, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, '\'jY', 0x44, 0x0, 0x0, @empty, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/21 01:53:33 executing program 7: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 2018/04/21 01:53:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000a4c000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00002a0e50)={0x14, 0x29, 0x1, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:53:33 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 2018/04/21 01:53:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) [ 97.551920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/21 01:53:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)='task\x00') getdents64(r0, &(0x7f0000003000)=""/48, 0x30) getdents(r0, &(0x7f0000000080)=""/34, 0x22) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 2018/04/21 01:53:33 executing program 6: syz_emit_ethernet(0x7e, &(0x7f0000000800)={@link_local={0x1, 0x80, 0xc2}, @empty, [{[], {0x8100, 0x2, 0x0, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, '\'jY', 0x44, 0x0, 0x0, @empty, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/21 01:53:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)='task\x00') getdents64(r0, &(0x7f0000003000)=""/48, 0x30) getdents(r0, &(0x7f0000000080)=""/34, 0x22) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 2018/04/21 01:53:33 executing program 1: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000fb8000)=@generic={0x20000000001e, "01030000000000ff00000000ff03000009bf79df21d60c7bc8790405c7bad62e0a53a632ed4938f50006fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f183bea5bdb9c8ead2000077aeb81c90001d6d5e980ee590c8b9f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000bd3000)=@generic={0x1e, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0x80) sendmsg(r0, &(0x7f0000f36fc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02010000000020df0000000000000000805bf86c57020002000000f1fffff400000000000000000000010300000000e4ff064b3fdf3a000000080000000000000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ece000206000000090000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f000091d000), 0x0, &(0x7f0000d19000)}, 0x0) 2018/04/21 01:53:33 executing program 7: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 97.594262] loop4: p1 [ 97.596983] loop4: partition table partially beyond EOD, truncated [ 97.629785] loop4: p1 start 1 is beyond EOD, truncated 2018/04/21 01:53:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) [ 97.688075] loop4: p1 [ 97.690675] loop4: partition table partially beyond EOD, truncated [ 97.746478] netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. [ 97.784344] loop4: p1 start 1 is beyond EOD, truncated 2018/04/21 01:53:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)='task\x00') getdents64(r0, &(0x7f0000003000)=""/48, 0x30) getdents(r0, &(0x7f0000000080)=""/34, 0x22) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 2018/04/21 01:53:34 executing program 6: syz_emit_ethernet(0x7e, &(0x7f0000000800)={@link_local={0x1, 0x80, 0xc2}, @empty, [{[], {0x8100, 0x2, 0x0, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, '\'jY', 0x44, 0x0, 0x0, @empty, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/21 01:53:34 executing program 1: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000fb8000)=@generic={0x20000000001e, "01030000000000ff00000000ff03000009bf79df21d60c7bc8790405c7bad62e0a53a632ed4938f50006fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f183bea5bdb9c8ead2000077aeb81c90001d6d5e980ee590c8b9f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000bd3000)=@generic={0x1e, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0x80) sendmsg(r0, &(0x7f0000f36fc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02010000000020df0000000000000000805bf86c57020002000000f1fffff400000000000000000000010300000000e4ff064b3fdf3a000000080000000000000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ece000206000000090000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f000091d000), 0x0, &(0x7f0000d19000)}, 0x0) 2018/04/21 01:53:34 executing program 0: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000fb8000)=@generic={0x20000000001e, "01030000000000ff00000000ff03000009bf79df21d60c7bc8790405c7bad62e0a53a632ed4938f50006fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f183bea5bdb9c8ead2000077aeb81c90001d6d5e980ee590c8b9f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000bd3000)=@generic={0x1e, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0x80) sendmsg(r0, &(0x7f0000f36fc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02010000000020df0000000000000000805bf86c57020002000000f1fffff400000000000000000000010300000000e4ff064b3fdf3a000000080000000000000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ece000206000000090000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f000091d000), 0x0, &(0x7f0000d19000)}, 0x0) 2018/04/21 01:53:34 executing program 7: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 2018/04/21 01:53:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) 2018/04/21 01:53:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) 2018/04/21 01:53:34 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 2018/04/21 01:53:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) 2018/04/21 01:53:34 executing program 6: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000a29000)={&(0x7f0000fc1fe4)=@in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000000040)}, 0x8000) close(r0) 2018/04/21 01:53:34 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) [ 98.241222] netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. [ 98.250499] loop4: p1 [ 98.253094] loop4: partition table partially beyond EOD, truncated [ 98.276303] loop4: p1 start 1 is beyond EOD, truncated 2018/04/21 01:53:34 executing program 1: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000fb8000)=@generic={0x20000000001e, "01030000000000ff00000000ff03000009bf79df21d60c7bc8790405c7bad62e0a53a632ed4938f50006fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f183bea5bdb9c8ead2000077aeb81c90001d6d5e980ee590c8b9f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000bd3000)=@generic={0x1e, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0x80) sendmsg(r0, &(0x7f0000f36fc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02010000000020df0000000000000000805bf86c57020002000000f1fffff400000000000000000000010300000000e4ff064b3fdf3a000000080000000000000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ece000206000000090000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f000091d000), 0x0, &(0x7f0000d19000)}, 0x0) 2018/04/21 01:53:34 executing program 7: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 2018/04/21 01:53:34 executing program 0: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000fb8000)=@generic={0x20000000001e, "01030000000000ff00000000ff03000009bf79df21d60c7bc8790405c7bad62e0a53a632ed4938f50006fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f183bea5bdb9c8ead2000077aeb81c90001d6d5e980ee590c8b9f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000bd3000)=@generic={0x1e, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0x80) sendmsg(r0, &(0x7f0000f36fc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02010000000020df0000000000000000805bf86c57020002000000f1fffff400000000000000000000010300000000e4ff064b3fdf3a000000080000000000000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ece000206000000090000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f000091d000), 0x0, &(0x7f0000d19000)}, 0x0) 2018/04/21 01:53:34 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 2018/04/21 01:53:34 executing program 5: mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000000c0)='./control\x00', 0x1000000) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='./control\x00', 0x81000000) inotify_add_watch(r0, &(0x7f00000001c0)='./control\x00', 0x80000000) [ 98.431312] netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. [ 98.508106] loop4: p1 [ 98.510763] loop4: partition table partially beyond EOD, truncated [ 98.560471] loop4: p1 start 1 is beyond EOD, truncated 2018/04/21 01:53:34 executing program 2: mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000000c0)='./control\x00', 0x1000000) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='./control\x00', 0x81000000) inotify_add_watch(r0, &(0x7f00000001c0)='./control\x00', 0x80000000) 2018/04/21 01:53:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) 2018/04/21 01:53:34 executing program 6: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000a29000)={&(0x7f0000fc1fe4)=@in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000000040)}, 0x8000) close(r0) 2018/04/21 01:53:34 executing program 1: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000fb8000)=@generic={0x20000000001e, "01030000000000ff00000000ff03000009bf79df21d60c7bc8790405c7bad62e0a53a632ed4938f50006fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f183bea5bdb9c8ead2000077aeb81c90001d6d5e980ee590c8b9f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000bd3000)=@generic={0x1e, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0x80) sendmsg(r0, &(0x7f0000f36fc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02010000000020df0000000000000000805bf86c57020002000000f1fffff400000000000000000000010300000000e4ff064b3fdf3a000000080000000000000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ece000206000000090000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f000091d000), 0x0, &(0x7f0000d19000)}, 0x0) 2018/04/21 01:53:34 executing program 0: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000fb8000)=@generic={0x20000000001e, "01030000000000ff00000000ff03000009bf79df21d60c7bc8790405c7bad62e0a53a632ed4938f50006fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f183bea5bdb9c8ead2000077aeb81c90001d6d5e980ee590c8b9f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000bd3000)=@generic={0x1e, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0x80) sendmsg(r0, &(0x7f0000f36fc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02010000000020df0000000000000000805bf86c57020002000000f1fffff400000000000000000000010300000000e4ff064b3fdf3a000000080000000000000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ece000206000000090000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f000091d000), 0x0, &(0x7f0000d19000)}, 0x0) 2018/04/21 01:53:34 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000002340)=""/219, 0xdb}], 0x109) readv(r0, &(0x7f0000000140), 0x2f7) read(r0, &(0x7f00000000c0)=""/75, 0x4b) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 2018/04/21 01:53:34 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 2018/04/21 01:53:34 executing program 5: mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000000c0)='./control\x00', 0x1000000) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='./control\x00', 0x81000000) inotify_add_watch(r0, &(0x7f00000001c0)='./control\x00', 0x80000000) 2018/04/21 01:53:34 executing program 5: mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000000c0)='./control\x00', 0x1000000) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='./control\x00', 0x81000000) inotify_add_watch(r0, &(0x7f00000001c0)='./control\x00', 0x80000000) 2018/04/21 01:53:34 executing program 6: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000a29000)={&(0x7f0000fc1fe4)=@in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000000040)}, 0x8000) close(r0) [ 98.658634] loop4: p1 [ 98.661248] loop4: partition table partially beyond EOD, truncated [ 98.677912] loop4: p1 start 1 is beyond EOD, truncated 2018/04/21 01:53:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) 2018/04/21 01:53:34 executing program 2: mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000000c0)='./control\x00', 0x1000000) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='./control\x00', 0x81000000) inotify_add_watch(r0, &(0x7f00000001c0)='./control\x00', 0x80000000) 2018/04/21 01:53:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) 2018/04/21 01:53:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@generic={0x0, "5c09ac7605eec1ec66e16b81a59161eeaedc277873225813f662c0c7de543c4398a38da1d1747fc628ada86c46ed06a199f65e206bf341f9d0e66c4838da6382c5a108f89417a68da461322f7f40450aa9aa219ea0b7034b9db8f9ada0feb1b71a604ca5f2ee96789d80ade17720d580f26c506adea4d0c5cc526b2ee1da"}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)=ANY=[]}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000009000)=r0, 0x4) 2018/04/21 01:53:35 executing program 5: mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000000c0)='./control\x00', 0x1000000) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='./control\x00', 0x81000000) inotify_add_watch(r0, &(0x7f00000001c0)='./control\x00', 0x80000000) 2018/04/21 01:53:35 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) listen(r1, 0x404) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) 2018/04/21 01:53:35 executing program 2: mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000000c0)='./control\x00', 0x1000000) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='./control\x00', 0x81000000) inotify_add_watch(r0, &(0x7f00000001c0)='./control\x00', 0x80000000) 2018/04/21 01:53:35 executing program 6: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000a29000)={&(0x7f0000fc1fe4)=@in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000000040)}, 0x8000) close(r0) 2018/04/21 01:53:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) 2018/04/21 01:53:35 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000080)) setpriority(0x1, 0x0, 0x0) 2018/04/21 01:53:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@generic={0x0, "5c09ac7605eec1ec66e16b81a59161eeaedc277873225813f662c0c7de543c4398a38da1d1747fc628ada86c46ed06a199f65e206bf341f9d0e66c4838da6382c5a108f89417a68da461322f7f40450aa9aa219ea0b7034b9db8f9ada0feb1b71a604ca5f2ee96789d80ade17720d580f26c506adea4d0c5cc526b2ee1da"}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)=ANY=[]}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000009000)=r0, 0x4) 2018/04/21 01:53:35 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) timer_create(0x9, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000080)}}, &(0x7f0000000000)) 2018/04/21 01:53:35 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000001fe8)) r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000007000000ff03000000000000"], 0x18}}], 0x2, 0x0) 2018/04/21 01:53:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) 2018/04/21 01:53:35 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000480)="44e5779ea959b81565a70ad552e6f11222c4c65365e11e005aefad9889de45e773", 0x21}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/21 01:53:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000002340)=""/219, 0xdb}], 0x109) readv(r0, &(0x7f0000000140), 0x2f7) read(r0, &(0x7f00000000c0)=""/75, 0x4b) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 2018/04/21 01:53:35 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000002340)=""/219, 0xdb}], 0x109) readv(r0, &(0x7f0000000140), 0x2f7) read(r0, &(0x7f00000000c0)=""/75, 0x4b) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 2018/04/21 01:53:35 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) timer_create(0x9, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000080)}}, &(0x7f0000000000)) 2018/04/21 01:53:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@generic={0x0, "5c09ac7605eec1ec66e16b81a59161eeaedc277873225813f662c0c7de543c4398a38da1d1747fc628ada86c46ed06a199f65e206bf341f9d0e66c4838da6382c5a108f89417a68da461322f7f40450aa9aa219ea0b7034b9db8f9ada0feb1b71a604ca5f2ee96789d80ade17720d580f26c506adea4d0c5cc526b2ee1da"}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)=ANY=[]}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000009000)=r0, 0x4) 2018/04/21 01:53:35 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000080)) setpriority(0x1, 0x0, 0x0) [ 99.588298] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) 2018/04/21 01:53:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) 2018/04/21 01:53:35 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000001fe8)) r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000007000000ff03000000000000"], 0x18}}], 0x2, 0x0) 2018/04/21 01:53:35 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000480)="44e5779ea959b81565a70ad552e6f11222c4c65365e11e005aefad9889de45e773", 0x21}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/21 01:53:35 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) timer_create(0x9, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000080)}}, &(0x7f0000000000)) 2018/04/21 01:53:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@generic={0x0, "5c09ac7605eec1ec66e16b81a59161eeaedc277873225813f662c0c7de543c4398a38da1d1747fc628ada86c46ed06a199f65e206bf341f9d0e66c4838da6382c5a108f89417a68da461322f7f40450aa9aa219ea0b7034b9db8f9ada0feb1b71a604ca5f2ee96789d80ade17720d580f26c506adea4d0c5cc526b2ee1da"}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)=ANY=[]}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000009000)=r0, 0x4) 2018/04/21 01:53:36 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000080)) setpriority(0x1, 0x0, 0x0) 2018/04/21 01:53:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000480)="44e5779ea959b81565a70ad552e6f11222c4c65365e11e005aefad9889de45e773", 0x21}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/21 01:53:36 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) timer_create(0x9, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000080)}}, &(0x7f0000000000)) 2018/04/21 01:53:36 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000480)="44e5779ea959b81565a70ad552e6f11222c4c65365e11e005aefad9889de45e773", 0x21}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/21 01:53:36 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000001fe8)) r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000007000000ff03000000000000"], 0x18}}], 0x2, 0x0) 2018/04/21 01:53:36 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000080)) setpriority(0x1, 0x0, 0x0) 2018/04/21 01:53:36 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000002340)=""/219, 0xdb}], 0x109) readv(r0, &(0x7f0000000140), 0x2f7) read(r0, &(0x7f00000000c0)=""/75, 0x4b) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 2018/04/21 01:53:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000480)="44e5779ea959b81565a70ad552e6f11222c4c65365e11e005aefad9889de45e773", 0x21}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/21 01:53:36 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000001fe8)) r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000007000000ff03000000000000"], 0x18}}], 0x2, 0x0) 2018/04/21 01:53:36 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x86, 0x0) io_setup(0x9, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000080)="10000000060000000000000000000000", 0x10}]) 2018/04/21 01:53:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000480)="44e5779ea959b81565a70ad552e6f11222c4c65365e11e005aefad9889de45e773", 0x21}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/21 01:53:36 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000001000), 0xfffffe7f) mmap$binder(&(0x7f0000991000/0x3000)=nil, 0x3000, 0x1000003, 0x12, r0, 0x0) 2018/04/21 01:53:36 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000480)="44e5779ea959b81565a70ad552e6f11222c4c65365e11e005aefad9889de45e773", 0x21}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/21 01:53:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000002340)=""/219, 0xdb}], 0x109) readv(r0, &(0x7f0000000140), 0x2f7) read(r0, &(0x7f00000000c0)=""/75, 0x4b) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 2018/04/21 01:53:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000480)="44e5779ea959b81565a70ad552e6f11222c4c65365e11e005aefad9889de45e773", 0x21}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/21 01:53:37 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r0 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x114, 0x2717, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000000)=0xc) 2018/04/21 01:53:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000480)="44e5779ea959b81565a70ad552e6f11222c4c65365e11e005aefad9889de45e773", 0x21}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/21 01:53:37 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f000000b000), &(0x7f000000dfe0)) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={r1}, &(0x7f00000000c0), 0x8) clock_settime(0x0, &(0x7f0000000100)={0x77359400}) 2018/04/21 01:53:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x86, 0x0) io_setup(0x9, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000080)="10000000060000000000000000000000", 0x10}]) 2018/04/21 01:53:37 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000002340)=""/219, 0xdb}], 0x109) readv(r0, &(0x7f0000000140), 0x2f7) read(r0, &(0x7f00000000c0)=""/75, 0x4b) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 2018/04/21 01:53:37 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000001000), 0xfffffe7f) mmap$binder(&(0x7f0000991000/0x3000)=nil, 0x3000, 0x1000003, 0x12, r0, 0x0) 2018/04/21 01:53:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000002340)=""/219, 0xdb}], 0x109) readv(r0, &(0x7f0000000140), 0x2f7) read(r0, &(0x7f00000000c0)=""/75, 0x4b) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 2018/04/21 01:53:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000480)="44e5779ea959b81565a70ad552e6f11222c4c65365e11e005aefad9889de45e773", 0x21}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/21 01:53:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fff9, 0x0) close(r0) 2018/04/21 01:53:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x86, 0x0) io_setup(0x9, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000080)="10000000060000000000000000000000", 0x10}]) 2018/04/21 01:53:37 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r0 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x114, 0x2717, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000000)=0xc) 2018/04/21 01:53:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x25dfdbfe, {0x2}, [@FOU_ATTR_AF={0x8, 0x2}]}, 0x1c}, 0x1}, 0x0) 2018/04/21 01:53:37 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r0 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x114, 0x2717, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000000)=0xc) 2018/04/21 01:53:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x86, 0x0) io_setup(0x9, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000080)="10000000060000000000000000000000", 0x10}]) [ 101.752833] netlink: 'syz-executor1': attribute type 2 has an invalid length. [ 101.776241] netlink: 'syz-executor1': attribute type 2 has an invalid length. 2033/05/18 03:33:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fff9, 0x0) close(r0) 2033/05/18 03:33:20 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r0 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x114, 0x2717, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000000)=0xc) 2033/05/18 03:33:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x25dfdbfe, {0x2}, [@FOU_ATTR_AF={0x8, 0x2}]}, 0x1c}, 0x1}, 0x0) 2033/05/18 03:33:20 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000180)=0xfffffffffffffffb) openat$audio(0xffffffffffffff9c, &(0x7f0000009000)='/dev/audio\x00', 0x0, 0x0) 2033/05/18 03:33:20 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000002640)=[0x0, 0xffffffffffffffff, 0x0]) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000026c0)={{0x0, 0x0, r0, 0x0, 0x0, 0x100}}) 2033/05/18 03:33:20 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)={0x2, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) 2033/05/18 03:33:20 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f000000b000), &(0x7f000000dfe0)) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={r1}, &(0x7f00000000c0), 0x8) clock_settime(0x0, &(0x7f0000000100)={0x77359400}) 2033/05/18 03:33:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000001000), 0xfffffe7f) mmap$binder(&(0x7f0000991000/0x3000)=nil, 0x3000, 0x1000003, 0x12, r0, 0x0) 2033/05/18 03:33:20 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000002640)=[0x0, 0xffffffffffffffff, 0x0]) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000026c0)={{0x0, 0x0, r0, 0x0, 0x0, 0x100}}) [ 102.586392] netlink: 'syz-executor1': attribute type 2 has an invalid length. 2033/05/18 03:33:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x25dfdbfe, {0x2}, [@FOU_ATTR_AF={0x8, 0x2}]}, 0x1c}, 0x1}, 0x0) 2033/05/18 03:33:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fff9, 0x0) close(r0) 2033/05/18 03:33:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fff9, 0x0) close(r0) 2033/05/18 03:33:20 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000180)=0xfffffffffffffffb) openat$audio(0xffffffffffffff9c, &(0x7f0000009000)='/dev/audio\x00', 0x0, 0x0) 2033/05/18 03:33:20 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)={0x2, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) [ 102.703374] netlink: 'syz-executor1': attribute type 2 has an invalid length. 2033/05/18 03:33:20 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000002640)=[0x0, 0xffffffffffffffff, 0x0]) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000026c0)={{0x0, 0x0, r0, 0x0, 0x0, 0x100}}) 2033/05/18 03:33:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x25dfdbfe, {0x2}, [@FOU_ATTR_AF={0x8, 0x2}]}, 0x1c}, 0x1}, 0x0) [ 102.892548] netlink: 'syz-executor1': attribute type 2 has an invalid length. 2033/05/18 03:33:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fff9, 0x0) close(r0) 2033/05/18 03:33:20 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000180)=0xfffffffffffffffb) openat$audio(0xffffffffffffff9c, &(0x7f0000009000)='/dev/audio\x00', 0x0, 0x0) 2033/05/18 03:33:20 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)={0x2, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) 2033/05/18 03:33:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fff9, 0x0) close(r0) 2033/05/18 03:33:20 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockname(r0, &(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, &(0x7f0000000240)=0x218) 2033/05/18 03:33:20 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000002640)=[0x0, 0xffffffffffffffff, 0x0]) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000026c0)={{0x0, 0x0, r0, 0x0, 0x0, 0x100}}) 2033/05/18 03:33:20 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f000000b000), &(0x7f000000dfe0)) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={r1}, &(0x7f00000000c0), 0x8) clock_settime(0x0, &(0x7f0000000100)={0x77359400}) 2033/05/18 03:33:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000001000), 0xfffffe7f) mmap$binder(&(0x7f0000991000/0x3000)=nil, 0x3000, 0x1000003, 0x12, r0, 0x0) 2033/05/18 03:33:20 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000180)=0xfffffffffffffffb) openat$audio(0xffffffffffffff9c, &(0x7f0000009000)='/dev/audio\x00', 0x0, 0x0) 2033/05/18 03:33:20 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000bd4aed)={@random="cd5c0b081bf2", @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "ff0703", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff]}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "09aea5", 0x0, 0x29, 0x0, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}, [], "057147259e28ebbb"}}}}}}}, 0x0) 2033/05/18 03:33:20 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockname(r0, &(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, &(0x7f0000000240)=0x218) 2033/05/18 03:33:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fff9, 0x0) close(r0) 2033/05/18 03:33:20 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)={0x2, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) 2033/05/18 03:33:20 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002200000007"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x0, 0x99, &(0x7f000000d000)=""/153}, 0x48) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x400448c9, &(0x7f0000000040)) 2033/05/18 03:33:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x7, 0x4) sendmsg(r0, &(0x7f0000001600)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f0000001540), 0x0, &(0x7f0000000000)}, 0x0) 2033/05/18 03:33:20 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000bd4aed)={@random="cd5c0b081bf2", @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "ff0703", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff]}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "09aea5", 0x0, 0x29, 0x0, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}, [], "057147259e28ebbb"}}}}}}}, 0x0) 2033/05/18 03:33:20 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockname(r0, &(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, &(0x7f0000000240)=0x218) 2033/05/18 03:33:20 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002200000007"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x0, 0x99, &(0x7f000000d000)=""/153}, 0x48) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x400448c9, &(0x7f0000000040)) 2033/05/18 03:33:20 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0x0, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r1, r0}, 0x10) 2033/05/18 03:33:20 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb782e4ad88b89d1fd309169f44812107130ee55db70510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4d89469806e405000000cefa8a934a", 0x30}, 0x60) close(r0) 2033/05/18 03:33:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x7, 0x4) sendmsg(r0, &(0x7f0000001600)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f0000001540), 0x0, &(0x7f0000000000)}, 0x0) 2033/05/18 03:33:20 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000bd4aed)={@random="cd5c0b081bf2", @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "ff0703", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff]}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "09aea5", 0x0, 0x29, 0x0, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}, [], "057147259e28ebbb"}}}}}}}, 0x0) 2033/05/18 03:33:20 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f000000b000), &(0x7f000000dfe0)) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={r1}, &(0x7f00000000c0), 0x8) clock_settime(0x0, &(0x7f0000000100)={0x77359400}) 2033/05/18 03:33:20 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x3}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x80}, 0x1}, 0x0) 2033/05/18 03:33:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x7, 0x4) sendmsg(r0, &(0x7f0000001600)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f0000001540), 0x0, &(0x7f0000000000)}, 0x0) 2033/05/18 03:33:20 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002200000007"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x0, 0x99, &(0x7f000000d000)=""/153}, 0x48) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x400448c9, &(0x7f0000000040)) 2033/05/18 03:33:20 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockname(r0, &(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, &(0x7f0000000240)=0x218) 2033/05/18 03:33:20 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb782e4ad88b89d1fd309169f44812107130ee55db70510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4d89469806e405000000cefa8a934a", 0x30}, 0x60) close(r0) 2033/05/18 03:33:20 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x3}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x80}, 0x1}, 0x0) 2033/05/18 03:33:20 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000bd4aed)={@random="cd5c0b081bf2", @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "ff0703", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff]}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "09aea5", 0x0, 0x29, 0x0, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}, [], "057147259e28ebbb"}}}}}}}, 0x0) 2033/05/18 03:33:20 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0x0, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r1, r0}, 0x10) 2033/05/18 03:33:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x7, 0x4) sendmsg(r0, &(0x7f0000001600)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f0000001540), 0x0, &(0x7f0000000000)}, 0x0) 2033/05/18 03:33:20 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x3}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x80}, 0x1}, 0x0) 2033/05/18 03:33:20 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002200000007"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x0, 0x99, &(0x7f000000d000)=""/153}, 0x48) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x400448c9, &(0x7f0000000040)) 2033/05/18 03:33:20 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb782e4ad88b89d1fd309169f44812107130ee55db70510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4d89469806e405000000cefa8a934a", 0x30}, 0x60) close(r0) 2033/05/18 03:33:20 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0x0, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r1, r0}, 0x10) 2033/05/18 03:33:20 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x3}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x80}, 0x1}, 0x0) 2033/05/18 03:33:20 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0x0, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r1, r0}, 0x10) 2033/05/18 03:33:20 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb782e4ad88b89d1fd309169f44812107130ee55db70510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4d89469806e405000000cefa8a934a", 0x30}, 0x60) close(r0) 2033/05/18 03:33:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0x0, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r1, r0}, 0x10) 2033/05/18 03:33:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f0000000100)=@abs, 0x6e) 2033/05/18 03:33:20 executing program 4: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200010000500010005000000001c08108f13", 0x12, 0x400}], 0x0, 0x0) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x80026) 2033/05/18 03:33:20 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4309(ccm(aes-asm)))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 2033/05/18 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) connect(r0, &(0x7f0000000180)=@in={0x2}, 0x10) 2033/05/18 03:33:20 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0xaa, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000080)="2700000014000707030e0000120f0a0011000100f5fe0012ff00a51b82d77a4b6db0068dd304f9", 0x27) 2033/05/18 03:33:20 executing program 2: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, {0xa}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000440)) 2033/05/18 03:33:20 executing program 7: clock_nanosleep(0x8, 0x2, &(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f00000005c0)) 2033/05/18 03:33:20 executing program 7: clock_nanosleep(0x8, 0x2, &(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f00000005c0)) 2033/05/18 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) connect(r0, &(0x7f0000000180)=@in={0x2}, 0x10) 2033/05/18 03:33:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0x0, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r1, r0}, 0x10) [ 105.816636] MINIX-fs: mounting unchecked file system, running fsck is recommended 2033/05/18 03:33:20 executing program 2: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, {0xa}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000440)) 2033/05/18 03:33:20 executing program 4: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200010000500010005000000001c08108f13", 0x12, 0x400}], 0x0, 0x0) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x80026) [ 105.929814] minix_free_inode: bit 1 already cleared 2033/05/18 03:33:20 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200010000500010005000000001c08108f13", 0x12, 0x400}], 0x0, 0x0) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x80026) 2033/05/18 03:33:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f0000000100)=@abs, 0x6e) 2033/05/18 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) connect(r0, &(0x7f0000000180)=@in={0x2}, 0x10) 2033/05/18 03:33:20 executing program 7: clock_nanosleep(0x8, 0x2, &(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f00000005c0)) 2033/05/18 03:33:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0x0, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r1, r0}, 0x10) 2033/05/18 03:33:20 executing program 2: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, {0xa}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000440)) [ 106.055578] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 106.063378] MINIX-fs: mounting unchecked file system, running fsck is recommended 2033/05/18 03:33:21 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4309(ccm(aes-asm)))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 2033/05/18 03:33:21 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) connect(r0, &(0x7f0000000180)=@in={0x2}, 0x10) 2033/05/18 03:33:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f0000000100)=@abs, 0x6e) 2033/05/18 03:33:21 executing program 7: clock_nanosleep(0x8, 0x2, &(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f00000005c0)) 2033/05/18 03:33:21 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000b90ffc), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000380)={0x0, 0x10, "ea172adaeb01f7ffffff000000c55bd0"}, &(0x7f0000000040)=0x18) 2033/05/18 03:33:21 executing program 4: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200010000500010005000000001c08108f13", 0x12, 0x400}], 0x0, 0x0) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x80026) 2033/05/18 03:33:21 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200010000500010005000000001c08108f13", 0x12, 0x400}], 0x0, 0x0) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x80026) 2033/05/18 03:33:21 executing program 2: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, {0xa}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000440)) [ 106.251299] minix_free_inode: bit 1 already cleared [ 106.259159] minix_free_inode: bit 1 already cleared 2033/05/18 03:33:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x100000000002, 0xa0}}, {{@in=@rand_addr, 0x0, 0x33}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) syz_emit_ethernet(0x17b, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)) 2033/05/18 03:33:21 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) 2033/05/18 03:33:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2}}}, &(0x7f0000000300)=0x90) 2033/05/18 03:33:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f0000000100)=@abs, 0x6e) [ 106.345150] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 106.363367] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 106.493143] minix_free_inode: bit 1 already cleared [ 106.556284] minix_free_inode: bit 1 already cleared 2033/05/18 03:33:21 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4309(ccm(aes-asm)))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 2033/05/18 03:33:21 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000b90ffc), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000380)={0x0, 0x10, "ea172adaeb01f7ffffff000000c55bd0"}, &(0x7f0000000040)=0x18) 2033/05/18 03:33:21 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200010000500010005000000001c08108f13", 0x12, 0x400}], 0x0, 0x0) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x80026) 2033/05/18 03:33:21 executing program 4: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200010000500010005000000001c08108f13", 0x12, 0x400}], 0x0, 0x0) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x80026) 2033/05/18 03:33:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x100000000002, 0xa0}}, {{@in=@rand_addr, 0x0, 0x33}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) syz_emit_ethernet(0x17b, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)) 2033/05/18 03:33:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2}}}, &(0x7f0000000300)=0x90) 2033/05/18 03:33:21 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) 2033/05/18 03:33:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x4, 0x40, 0x6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/55}, 0x18) 2033/05/18 03:33:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x4, 0x40, 0x6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/55}, 0x18) [ 106.661153] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 106.686785] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 106.790256] minix_free_inode: bit 1 already cleared 2033/05/18 03:33:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x100000000002, 0xa0}}, {{@in=@rand_addr, 0x0, 0x33}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) syz_emit_ethernet(0x17b, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)) 2033/05/18 03:33:21 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) 2033/05/18 03:33:21 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4309(ccm(aes-asm)))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 2033/05/18 03:33:21 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000b90ffc), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000380)={0x0, 0x10, "ea172adaeb01f7ffffff000000c55bd0"}, &(0x7f0000000040)=0x18) 2033/05/18 03:33:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2}}}, &(0x7f0000000300)=0x90) 2033/05/18 03:33:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x4, 0x40, 0x6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/55}, 0x18) 2033/05/18 03:33:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2}}}, &(0x7f0000000300)=0x90) [ 106.840144] minix_free_inode: bit 1 already cleared 2033/05/18 03:33:21 executing program 1: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2033/05/18 03:33:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x100000000002, 0xa0}}, {{@in=@rand_addr, 0x0, 0x33}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) syz_emit_ethernet(0x17b, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)) 2033/05/18 03:33:21 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) 2033/05/18 03:33:21 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000b90ffc), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000380)={0x0, 0x10, "ea172adaeb01f7ffffff000000c55bd0"}, &(0x7f0000000040)=0x18) 2033/05/18 03:33:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x4, 0x40, 0x6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/55}, 0x18) 2033/05/18 03:33:21 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x1]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) sendmsg$alg(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="26fe6bbd22e1c516390d2def920057d19b8834c5f714cf28a5f622f9a64db7c134e76f50cc0e0ee56f0defcca50b1193fb7047512fe18f51719fca6026c58c80ff0b0bc389779cc6dcff86353e65b9762dc50a5f44059df2e170abc6589ac48030b9e1b75ebefea6b5e9ee4dc386ee149e41b0d09f970e0f4862943c663255f686e860dffa32d20315d40570c301459473fbc5b51a8f81294c94bfb8142f1d40e28bc2ead49285427defa78fd181e573d6ed4202fc5d64ba092871b02d3fd198324b586be690d6d97febc26f9742ebc4a38a6db3ed3f9d08dcb82c25b4c853552e41a477ceedb0756d7a5b7c174bda723937d18953d7c0be4b603f111170b45cc9fbf22d8f0885fbf1a6f23a9adef5b8a3cf13e86b34807c2d9723487e3b8361717fcd07fd6aaf0edc2c8fa91eb9f3d36cbb1079e7c4dd66eb55ad7078b8e1275b01fd4f526beac1475e5f118f3333a2e6f1ff16904a5b76469ea494e36846e6c48f8da5a8367354004210709bc18c191eb17e3553709cde12fec70be55916bf", 0x180}], 0x1}, 0x0) r6 = semget$private(0x0, 0x6, 0x9) semctl$GETZCNT(r6, 0x5, 0xf, &(0x7f0000001740)=""/172) 2033/05/18 03:33:21 executing program 1: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2033/05/18 03:33:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x800000004e20, @rand_addr}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2033/05/18 03:33:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x800000004e20, @rand_addr}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2033/05/18 03:33:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2}}}, &(0x7f0000000300)=0x90) 2033/05/18 03:33:22 executing program 5: clone(0x0, &(0x7f0000151000), &(0x7f0000000080), &(0x7f0000f8b000), &(0x7f0000000100)) 2033/05/18 03:33:22 executing program 3: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') umount2(&(0x7f0000000100)='./control/file1\x00', 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 2033/05/18 03:33:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x1]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) sendmsg$alg(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="26fe6bbd22e1c516390d2def920057d19b8834c5f714cf28a5f622f9a64db7c134e76f50cc0e0ee56f0defcca50b1193fb7047512fe18f51719fca6026c58c80ff0b0bc389779cc6dcff86353e65b9762dc50a5f44059df2e170abc6589ac48030b9e1b75ebefea6b5e9ee4dc386ee149e41b0d09f970e0f4862943c663255f686e860dffa32d20315d40570c301459473fbc5b51a8f81294c94bfb8142f1d40e28bc2ead49285427defa78fd181e573d6ed4202fc5d64ba092871b02d3fd198324b586be690d6d97febc26f9742ebc4a38a6db3ed3f9d08dcb82c25b4c853552e41a477ceedb0756d7a5b7c174bda723937d18953d7c0be4b603f111170b45cc9fbf22d8f0885fbf1a6f23a9adef5b8a3cf13e86b34807c2d9723487e3b8361717fcd07fd6aaf0edc2c8fa91eb9f3d36cbb1079e7c4dd66eb55ad7078b8e1275b01fd4f526beac1475e5f118f3333a2e6f1ff16904a5b76469ea494e36846e6c48f8da5a8367354004210709bc18c191eb17e3553709cde12fec70be55916bf", 0x180}], 0x1}, 0x0) r6 = semget$private(0x0, 0x6, 0x9) semctl$GETZCNT(r6, 0x5, 0xf, &(0x7f0000001740)=""/172) 2033/05/18 03:33:22 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2}}}, &(0x7f0000000300)=0x90) 2033/05/18 03:33:22 executing program 1: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2033/05/18 03:33:22 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x1]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) sendmsg$alg(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="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", 0x180}], 0x1}, 0x0) r6 = semget$private(0x0, 0x6, 0x9) semctl$GETZCNT(r6, 0x5, 0xf, &(0x7f0000001740)=""/172) 2033/05/18 03:33:22 executing program 1: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2033/05/18 03:33:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x800000004e20, @rand_addr}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2033/05/18 03:33:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x1]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) sendmsg$alg(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="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", 0x180}], 0x1}, 0x0) r6 = semget$private(0x0, 0x6, 0x9) semctl$GETZCNT(r6, 0x5, 0xf, &(0x7f0000001740)=""/172) 2033/05/18 03:33:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x1]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) sendmsg$alg(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="26fe6bbd22e1c516390d2def920057d19b8834c5f714cf28a5f622f9a64db7c134e76f50cc0e0ee56f0defcca50b1193fb7047512fe18f51719fca6026c58c80ff0b0bc389779cc6dcff86353e65b9762dc50a5f44059df2e170abc6589ac48030b9e1b75ebefea6b5e9ee4dc386ee149e41b0d09f970e0f4862943c663255f686e860dffa32d20315d40570c301459473fbc5b51a8f81294c94bfb8142f1d40e28bc2ead49285427defa78fd181e573d6ed4202fc5d64ba092871b02d3fd198324b586be690d6d97febc26f9742ebc4a38a6db3ed3f9d08dcb82c25b4c853552e41a477ceedb0756d7a5b7c174bda723937d18953d7c0be4b603f111170b45cc9fbf22d8f0885fbf1a6f23a9adef5b8a3cf13e86b34807c2d9723487e3b8361717fcd07fd6aaf0edc2c8fa91eb9f3d36cbb1079e7c4dd66eb55ad7078b8e1275b01fd4f526beac1475e5f118f3333a2e6f1ff16904a5b76469ea494e36846e6c48f8da5a8367354004210709bc18c191eb17e3553709cde12fec70be55916bf", 0x180}], 0x1}, 0x0) r6 = semget$private(0x0, 0x6, 0x9) semctl$GETZCNT(r6, 0x5, 0xf, &(0x7f0000001740)=""/172) 2033/05/18 03:33:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000140)="260f015d0f66baf80cb88fbf9887ef66bafc0cb000ee66bad10466edc4e17c2f9516e6f71dc4e2690340a78fc9e89624d0c4c17e6f4a00440f20c03502000000440f22c0c4e11515deb8000000000f23c00f21f83500000d000f23f8", 0x5c}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2033/05/18 03:33:22 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x1]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) sendmsg$alg(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="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", 0x180}], 0x1}, 0x0) r6 = semget$private(0x0, 0x6, 0x9) semctl$GETZCNT(r6, 0x5, 0xf, &(0x7f0000001740)=""/172) 2033/05/18 03:33:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2}}}, &(0x7f0000000300)=0x90) 2033/05/18 03:33:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000000080), 0x26) 2033/05/18 03:33:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x800000004e20, @rand_addr}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2033/05/18 03:33:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x1]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) sendmsg$alg(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="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", 0x180}], 0x1}, 0x0) r6 = semget$private(0x0, 0x6, 0x9) semctl$GETZCNT(r6, 0x5, 0xf, &(0x7f0000001740)=""/172) 2033/05/18 03:33:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000000080), 0x26) 2033/05/18 03:33:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000140)="260f015d0f66baf80cb88fbf9887ef66bafc0cb000ee66bad10466edc4e17c2f9516e6f71dc4e2690340a78fc9e89624d0c4c17e6f4a00440f20c03502000000440f22c0c4e11515deb8000000000f23c00f21f83500000d000f23f8", 0x5c}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2033/05/18 03:33:22 executing program 3: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') umount2(&(0x7f0000000100)='./control/file1\x00', 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 2033/05/18 03:33:22 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000040)}}], 0x2, 0x0) 2033/05/18 03:33:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x1]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) sendmsg$alg(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="26fe6bbd22e1c516390d2def920057d19b8834c5f714cf28a5f622f9a64db7c134e76f50cc0e0ee56f0defcca50b1193fb7047512fe18f51719fca6026c58c80ff0b0bc389779cc6dcff86353e65b9762dc50a5f44059df2e170abc6589ac48030b9e1b75ebefea6b5e9ee4dc386ee149e41b0d09f970e0f4862943c663255f686e860dffa32d20315d40570c301459473fbc5b51a8f81294c94bfb8142f1d40e28bc2ead49285427defa78fd181e573d6ed4202fc5d64ba092871b02d3fd198324b586be690d6d97febc26f9742ebc4a38a6db3ed3f9d08dcb82c25b4c853552e41a477ceedb0756d7a5b7c174bda723937d18953d7c0be4b603f111170b45cc9fbf22d8f0885fbf1a6f23a9adef5b8a3cf13e86b34807c2d9723487e3b8361717fcd07fd6aaf0edc2c8fa91eb9f3d36cbb1079e7c4dd66eb55ad7078b8e1275b01fd4f526beac1475e5f118f3333a2e6f1ff16904a5b76469ea494e36846e6c48f8da5a8367354004210709bc18c191eb17e3553709cde12fec70be55916bf", 0x180}], 0x1}, 0x0) r6 = semget$private(0x0, 0x6, 0x9) semctl$GETZCNT(r6, 0x5, 0xf, &(0x7f0000001740)=""/172) 2033/05/18 03:33:22 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) creat(&(0x7f0000a2a000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 2033/05/18 03:33:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xc5b6, 0x1, &(0x7f0000001680)=[{&(0x7f0000010000)="eb58906d6b66732e66617400100120000200008000f80000200040000000000000000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000140)) 2033/05/18 03:33:22 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x1]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) sendmsg$alg(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="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", 0x180}], 0x1}, 0x0) r6 = semget$private(0x0, 0x6, 0x9) semctl$GETZCNT(r6, 0x5, 0xf, &(0x7f0000001740)=""/172) 2033/05/18 03:33:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000000080), 0x26) 2033/05/18 03:33:23 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000000080), 0x26) [ 108.297944] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 2033/05/18 03:33:23 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000040)}}], 0x2, 0x0) [ 108.350977] FAT-fs (loop0): FAT read failed (blocknr 32) 2033/05/18 03:33:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000140)="260f015d0f66baf80cb88fbf9887ef66bafc0cb000ee66bad10466edc4e17c2f9516e6f71dc4e2690340a78fc9e89624d0c4c17e6f4a00440f20c03502000000440f22c0c4e11515deb8000000000f23c00f21f83500000d000f23f8", 0x5c}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 108.393609] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 108.442290] FAT-fs (loop0): FAT read failed (blocknr 32) 2033/05/18 03:33:23 executing program 6: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') umount2(&(0x7f0000000100)='./control/file1\x00', 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 2033/05/18 03:33:24 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000040)}}], 0x2, 0x0) 2033/05/18 03:33:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x1]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) sendmsg$alg(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="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", 0x180}], 0x1}, 0x0) r6 = semget$private(0x0, 0x6, 0x9) semctl$GETZCNT(r6, 0x5, 0xf, &(0x7f0000001740)=""/172) 2033/05/18 03:33:24 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2033/05/18 03:33:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xc5b6, 0x1, &(0x7f0000001680)=[{&(0x7f0000010000)="eb58906d6b66732e66617400100120000200008000f80000200040000000000000000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000140)) 2033/05/18 03:33:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000140)="260f015d0f66baf80cb88fbf9887ef66bafc0cb000ee66bad10466edc4e17c2f9516e6f71dc4e2690340a78fc9e89624d0c4c17e6f4a00440f20c03502000000440f22c0c4e11515deb8000000000f23c00f21f83500000d000f23f8", 0x5c}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2033/05/18 03:33:24 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) creat(&(0x7f0000a2a000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 2033/05/18 03:33:24 executing program 6: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') umount2(&(0x7f0000000100)='./control/file1\x00', 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 2033/05/18 03:33:24 executing program 3: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') umount2(&(0x7f0000000100)='./control/file1\x00', 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 2033/05/18 03:33:24 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000040)}}], 0x2, 0x0) [ 109.513258] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 109.537000] FAT-fs (loop0): FAT read failed (blocknr 32) 2033/05/18 03:33:24 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2033/05/18 03:33:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xc5b6, 0x1, &(0x7f0000001680)=[{&(0x7f0000010000)="eb58906d6b66732e66617400100120000200008000f80000200040000000000000000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000140)) 2033/05/18 03:33:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}) write$evdev(r0, &(0x7f0000f15fd0)=[{{}, 0x1, 0x63, 0x2}, {}], 0x30) 2033/05/18 03:33:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000d4b000)=0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000000c0)={{0x3180}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac5, 0x0, 0x1, 0x6}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000efb000)='/dev/sequencer2\x00', 0x0, 0x0) 2033/05/18 03:33:24 executing program 5: r0 = open(&(0x7f000001dff8)='./file0\x00', 0x80040, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000db4ff8)='./file0\x00', 0x12) close(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2033/05/18 03:33:24 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 109.719642] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 109.739344] FAT-fs (loop0): FAT read failed (blocknr 32) 2033/05/18 03:33:25 executing program 5: r0 = open(&(0x7f000001dff8)='./file0\x00', 0x80040, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000db4ff8)='./file0\x00', 0x12) close(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2033/05/18 03:33:25 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2033/05/18 03:33:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xc5b6, 0x1, &(0x7f0000001680)=[{&(0x7f0000010000)="eb58906d6b66732e66617400100120000200008000f80000200040000000000000000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000140)) 2033/05/18 03:33:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}) write$evdev(r0, &(0x7f0000f15fd0)=[{{}, 0x1, 0x63, 0x2}, {}], 0x30) 2033/05/18 03:33:25 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) creat(&(0x7f0000a2a000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 2033/05/18 03:33:25 executing program 3: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') umount2(&(0x7f0000000100)='./control/file1\x00', 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 2033/05/18 03:33:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000d4b000)=0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000000c0)={{0x3180}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac5, 0x0, 0x1, 0x6}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000efb000)='/dev/sequencer2\x00', 0x0, 0x0) 2033/05/18 03:33:25 executing program 6: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') umount2(&(0x7f0000000100)='./control/file1\x00', 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 2033/05/18 03:33:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}) write$evdev(r0, &(0x7f0000f15fd0)=[{{}, 0x1, 0x63, 0x2}, {}], 0x30) 2033/05/18 03:33:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}) write$evdev(r0, &(0x7f0000f15fd0)=[{{}, 0x1, 0x63, 0x2}, {}], 0x30) 2033/05/18 03:33:25 executing program 5: r0 = open(&(0x7f000001dff8)='./file0\x00', 0x80040, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000db4ff8)='./file0\x00', 0x12) close(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) [ 110.863281] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 110.888898] FAT-fs (loop0): FAT read failed (blocknr 32) 2033/05/18 03:33:25 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f00000c5ff7)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x80da14, 0x8001}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2033/05/18 03:33:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}) write$evdev(r0, &(0x7f0000f15fd0)=[{{}, 0x1, 0x63, 0x2}, {}], 0x30) 2033/05/18 03:33:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}) write$evdev(r0, &(0x7f0000f15fd0)=[{{}, 0x1, 0x63, 0x2}, {}], 0x30) 2033/05/18 03:33:25 executing program 5: r0 = open(&(0x7f000001dff8)='./file0\x00', 0x80040, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000db4ff8)='./file0\x00', 0x12) close(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2033/05/18 03:33:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}) write$evdev(r0, &(0x7f0000f15fd0)=[{{}, 0x1, 0x63, 0x2}, {}], 0x30) 2033/05/18 03:33:25 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x6c00000000000000, 0x48c, &(0x7f0000000000)={0x2, 'bond_slave\x00'}, 0x18) 2033/05/18 03:33:25 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f00000c5ff7)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x80da14, 0x8001}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') [ 111.161159] IPVS: stopping backup sync thread 8823 ... [ 111.179684] IPVS: stopping backup sync thread 8826 ... 2033/05/18 03:33:26 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f00000c5ff7)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x80da14, 0x8001}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2033/05/18 03:33:26 executing program 1: r0 = getpid() prctl$setptracer(0x59616d61, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/166) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-generic)\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) unshare(0x60000000) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) uname(&(0x7f00000000c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/154) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2033/05/18 03:33:26 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x6c00000000000000, 0x48c, &(0x7f0000000000)={0x2, 'bond_slave\x00'}, 0x18) 2033/05/18 03:33:26 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x6c00000000000000, 0x48c, &(0x7f0000000000)={0x2, 'bond_slave\x00'}, 0x18) 2033/05/18 03:33:26 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) creat(&(0x7f0000a2a000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 2033/05/18 03:33:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r2, 0x2, &(0x7f0000001a40)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000480)="7a7bad7b42e1", 0x6}]) 2033/05/18 03:33:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000d4b000)=0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000000c0)={{0x3180}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac5, 0x0, 0x1, 0x6}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000efb000)='/dev/sequencer2\x00', 0x0, 0x0) 2033/05/18 03:33:26 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005b9388ad2d6ea61ebcc080054f38021566ad9f07f0000e381e5b3b60000", 0x22) 2033/05/18 03:33:26 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f00000c5ff7)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x80da14, 0x8001}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') [ 111.838420] IPVS: stopping backup sync thread 8858 ... [ 111.838699] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 111.869231] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 111.878311] IPVS: stopping backup sync thread 8866 ... 2033/05/18 03:33:26 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x6c00000000000000, 0x48c, &(0x7f0000000000)={0x2, 'bond_slave\x00'}, 0x18) 2033/05/18 03:33:26 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x6c00000000000000, 0x48c, &(0x7f0000000000)={0x2, 'bond_slave\x00'}, 0x18) 2033/05/18 03:33:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r2, 0x2, &(0x7f0000001a40)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000480)="7a7bad7b42e1", 0x6}]) [ 111.971768] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:33:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r2, 0x2, &(0x7f0000001a40)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000480)="7a7bad7b42e1", 0x6}]) [ 112.015766] IPVS: stopping backup sync thread 8890 ... [ 112.016439] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 112.051111] IPVS: stopping backup sync thread 8893 ... 2033/05/18 03:33:26 executing program 0: r0 = socket$inet6(0x10, 0x100000000000003, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)="5500000018007fbdb72d1cb2a4a280930a06000000a8430891000000390008000a001000000000001900a307250000000000d374e1b61e32abd0a4df57db81314c00dc1338d54400009b84136ef75afb83de448daa", 0x55}], 0x1, &(0x7f0000006000)}, 0x0) 2033/05/18 03:33:26 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x6c00000000000000, 0x48c, &(0x7f0000000000)={0x2, 'bond_slave\x00'}, 0x18) 2033/05/18 03:33:26 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x6c00000000000000, 0x48c, &(0x7f0000000000)={0x2, 'bond_slave\x00'}, 0x18) 2033/05/18 03:33:26 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005b9388ad2d6ea61ebcc080054f38021566ad9f07f0000e381e5b3b60000", 0x22) [ 112.208496] IPVS: stopping backup sync thread 8911 ... [ 112.218423] IPVS: ftp: loaded support on port[0] = 21 [ 112.256317] IPVS: stopping backup sync thread 8918 ... 2033/05/18 03:33:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r2, 0x2, &(0x7f0000001a40)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000480)="7a7bad7b42e1", 0x6}]) 2033/05/18 03:33:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=@ethtool_test={0x1a}}) 2033/05/18 03:33:27 executing program 0: r0 = socket$inet6(0x10, 0x100000000000003, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)="5500000018007fbdb72d1cb2a4a280930a06000000a8430891000000390008000a001000000000001900a307250000000000d374e1b61e32abd0a4df57db81314c00dc1338d54400009b84136ef75afb83de448daa", 0x55}], 0x1, &(0x7f0000006000)}, 0x0) 2033/05/18 03:33:27 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x4ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abcfff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:27 executing program 1: r0 = getpid() prctl$setptracer(0x59616d61, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/166) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-generic)\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) unshare(0x60000000) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) uname(&(0x7f00000000c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/154) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2033/05/18 03:33:27 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005b9388ad2d6ea61ebcc080054f38021566ad9f07f0000e381e5b3b60000", 0x22) 2033/05/18 03:33:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000d4b000)=0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000000c0)={{0x3180}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac5, 0x0, 0x1, 0x6}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000efb000)='/dev/sequencer2\x00', 0x0, 0x0) 2033/05/18 03:33:27 executing program 7: r0 = getpid() prctl$setptracer(0x59616d61, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/166) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-generic)\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) unshare(0x60000000) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) uname(&(0x7f00000000c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/154) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2033/05/18 03:33:27 executing program 5: r0 = getpid() prctl$setptracer(0x59616d61, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/166) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-generic)\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) unshare(0x60000000) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) uname(&(0x7f00000000c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/154) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 112.905291] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:33:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=@ethtool_test={0x1a}}) 2033/05/18 03:33:27 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005b9388ad2d6ea61ebcc080054f38021566ad9f07f0000e381e5b3b60000", 0x22) [ 112.929599] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:33:27 executing program 0: r0 = socket$inet6(0x10, 0x100000000000003, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)="5500000018007fbdb72d1cb2a4a280930a06000000a8430891000000390008000a001000000000001900a307250000000000d374e1b61e32abd0a4df57db81314c00dc1338d54400009b84136ef75afb83de448daa", 0x55}], 0x1, &(0x7f0000006000)}, 0x0) 2033/05/18 03:33:27 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x4ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abcfff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=@ethtool_test={0x1a}}) [ 113.058007] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:33:27 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x4ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abcfff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:27 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x4ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abcfff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:28 executing program 0: r0 = socket$inet6(0x10, 0x100000000000003, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)="5500000018007fbdb72d1cb2a4a280930a06000000a8430891000000390008000a001000000000001900a307250000000000d374e1b61e32abd0a4df57db81314c00dc1338d54400009b84136ef75afb83de448daa", 0x55}], 0x1, &(0x7f0000006000)}, 0x0) 2033/05/18 03:33:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=@ethtool_test={0x1a}}) 2033/05/18 03:33:28 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x4ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abcfff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:28 executing program 7: r0 = getpid() prctl$setptracer(0x59616d61, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/166) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-generic)\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) unshare(0x60000000) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) uname(&(0x7f00000000c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/154) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2033/05/18 03:33:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x4ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abcfff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:28 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00006f4000)={0xfed, 0x2, 0x0, 0x0}) lseek(r1, 0x0, 0x0) 2033/05/18 03:33:28 executing program 1: r0 = getpid() prctl$setptracer(0x59616d61, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/166) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-generic)\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) unshare(0x60000000) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) uname(&(0x7f00000000c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/154) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2033/05/18 03:33:28 executing program 5: r0 = getpid() prctl$setptracer(0x59616d61, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/166) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-generic)\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) unshare(0x60000000) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) uname(&(0x7f00000000c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/154) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2033/05/18 03:33:28 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0xc, 0x0, &(0x7f00000001c0)=[@register_looper={0x630b}, @acquire={0x40046305}], 0x0, 0x0, &(0x7f00000002c0)}) 2033/05/18 03:33:28 executing program 6: r0 = syz_open_dev$sndctrl(&(0x7f000051dfef)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) dup3(r0, r1, 0x0) 2033/05/18 03:33:28 executing program 0: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) [ 113.907121] IPVS: ftp: loaded support on port[0] = 21 [ 113.918121] IPVS: ftp: loaded support on port[0] = 21 [ 113.929225] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:33:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x4ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abcfff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:28 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00006f4000)={0xfed, 0x2, 0x0, 0x0}) lseek(r1, 0x0, 0x0) [ 114.038136] binder: 9009:9014 ERROR: BC_REGISTER_LOOPER called without request 2033/05/18 03:33:28 executing program 6: r0 = syz_open_dev$sndctrl(&(0x7f000051dfef)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) dup3(r0, r1, 0x0) [ 114.095990] binder: 9009:9014 Acquire 1 refcount change on invalid ref 0 ret -22 2033/05/18 03:33:29 executing program 0: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 2033/05/18 03:33:29 executing program 6: r0 = syz_open_dev$sndctrl(&(0x7f000051dfef)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) dup3(r0, r1, 0x0) 2033/05/18 03:33:29 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0xc, 0x0, &(0x7f00000001c0)=[@register_looper={0x630b}, @acquire={0x40046305}], 0x0, 0x0, &(0x7f00000002c0)}) 2033/05/18 03:33:29 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00006f4000)={0xfed, 0x2, 0x0, 0x0}) lseek(r1, 0x0, 0x0) 2033/05/18 03:33:29 executing program 7: r0 = getpid() prctl$setptracer(0x59616d61, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/166) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-generic)\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) unshare(0x60000000) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) uname(&(0x7f00000000c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/154) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2033/05/18 03:33:29 executing program 5: r0 = getpid() prctl$setptracer(0x59616d61, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/166) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-generic)\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) unshare(0x60000000) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) uname(&(0x7f00000000c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/154) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2033/05/18 03:33:29 executing program 1: r0 = getpid() prctl$setptracer(0x59616d61, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/166) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-generic)\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) unshare(0x60000000) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) uname(&(0x7f00000000c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/154) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2033/05/18 03:33:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x23, 0xaff, 0x0, 0x0, {0x2}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}, 0x1}, 0x0) [ 115.088875] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 115.099094] binder: 9043:9045 ERROR: BC_REGISTER_LOOPER called without request 2033/05/18 03:33:29 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00006f4000)={0xfed, 0x2, 0x0, 0x0}) lseek(r1, 0x0, 0x0) 2033/05/18 03:33:29 executing program 6: r0 = syz_open_dev$sndctrl(&(0x7f000051dfef)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) dup3(r0, r1, 0x0) [ 115.129451] IPVS: ftp: loaded support on port[0] = 21 [ 115.132459] IPVS: ftp: loaded support on port[0] = 21 [ 115.160727] IPVS: ftp: loaded support on port[0] = 21 [ 115.166102] binder: 9043:9045 Acquire 1 refcount change on invalid ref 0 ret -22 2033/05/18 03:33:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x23, 0xaff, 0x0, 0x0, {0x2}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}, 0x1}, 0x0) 2033/05/18 03:33:29 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x800000001, 0x0) write$fuse(r0, &(0x7f00000000c0)={0x28, 0x6, 0x0, @fuse_notify_delete_out}, 0x28) 2033/05/18 03:33:30 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0xc, 0x0, &(0x7f00000001c0)=[@register_looper={0x630b}, @acquire={0x40046305}], 0x0, 0x0, &(0x7f00000002c0)}) 2033/05/18 03:33:30 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000005ff7)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0xa, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x6012, r4, 0x0) mremap(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000080)) [ 115.282714] netlink: 'syz-executor3': attribute type 1 has an invalid length. 2033/05/18 03:33:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x23, 0xaff, 0x0, 0x0, {0x2}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}, 0x1}, 0x0) [ 115.366632] binder: 9066:9067 ERROR: BC_REGISTER_LOOPER called without request 2033/05/18 03:33:30 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x800000001, 0x0) write$fuse(r0, &(0x7f00000000c0)={0x28, 0x6, 0x0, @fuse_notify_delete_out}, 0x28) [ 115.429518] binder: 9066:9067 Acquire 1 refcount change on invalid ref 0 ret -22 [ 115.458772] x86/PAT: syz-executor6:9069 map pfn RAM range req write-combining for [mem 0x1a9190000-0x1a9193fff], got write-back [ 115.461711] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 115.552378] x86/PAT: syz-executor6:9076 map pfn RAM range req write-combining for [mem 0x1a9190000-0x1a9193fff], got write-back 2033/05/18 03:33:30 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000005ff7)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0xa, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x6012, r4, 0x0) mremap(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000080)) 2033/05/18 03:33:30 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0xc, 0x0, &(0x7f00000001c0)=[@register_looper={0x630b}, @acquire={0x40046305}], 0x0, 0x0, &(0x7f00000002c0)}) 2033/05/18 03:33:30 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x800000001, 0x0) write$fuse(r0, &(0x7f00000000c0)={0x28, 0x6, 0x0, @fuse_notify_delete_out}, 0x28) 2033/05/18 03:33:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x23, 0xaff, 0x0, 0x0, {0x2}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}, 0x1}, 0x0) 2033/05/18 03:33:30 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$PIO_UNISCRNMAP(r1, 0x80047456, &(0x7f0000000280)) 2033/05/18 03:33:30 executing program 1: r0 = syz_open_dev$binder(&(0x7f00006fe000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000001c0)={'security\x00', 0x2, [{}, {}]}, 0x48) 2033/05/18 03:33:30 executing program 5: syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x8100, 0x8}}}}}, 0x0) 2033/05/18 03:33:30 executing program 0: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) [ 116.097125] binder: 9091:9093 ERROR: BC_REGISTER_LOOPER called without request [ 116.098884] netlink: 'syz-executor3': attribute type 1 has an invalid length. 2033/05/18 03:33:30 executing program 5: syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x8100, 0x8}}}}}, 0x0) 2033/05/18 03:33:30 executing program 1: r0 = syz_open_dev$binder(&(0x7f00006fe000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000001c0)={'security\x00', 0x2, [{}, {}]}, 0x48) [ 116.143227] x86/PAT: syz-executor6:9089 map pfn RAM range req write-combining for [mem 0x1a9190000-0x1a9193fff], got write-back [ 116.152606] binder: 9091:9093 Acquire 1 refcount change on invalid ref 0 ret -22 2033/05/18 03:33:30 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$PIO_UNISCRNMAP(r1, 0x80047456, &(0x7f0000000280)) 2033/05/18 03:33:30 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x800000001, 0x0) write$fuse(r0, &(0x7f00000000c0)={0x28, 0x6, 0x0, @fuse_notify_delete_out}, 0x28) 2033/05/18 03:33:30 executing program 3: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x9e38000000000) 2033/05/18 03:33:31 executing program 5: syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x8100, 0x8}}}}}, 0x0) 2033/05/18 03:33:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='\x00', 0xffffffffffffffff) write$rdma_cm(r0, &(0x7f0000001f00)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001ec0)}}, 0x20) 2033/05/18 03:33:31 executing program 1: r0 = syz_open_dev$binder(&(0x7f00006fe000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000001c0)={'security\x00', 0x2, [{}, {}]}, 0x48) 2033/05/18 03:33:31 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000005ff7)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0xa, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x6012, r4, 0x0) mremap(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000080)) 2033/05/18 03:33:31 executing program 3: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x9e38000000000) 2033/05/18 03:33:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$PIO_UNISCRNMAP(r1, 0x80047456, &(0x7f0000000280)) [ 116.415222] ucma_write: process 448 (syz-executor2) changed security contexts after opening file descriptor, this is not allowed. [ 116.563604] x86/PAT: syz-executor6:9140 map pfn RAM range req write-combining for [mem 0x1a9190000-0x1a9193fff], got write-back 2033/05/18 03:33:31 executing program 5: syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x8100, 0x8}}}}}, 0x0) 2033/05/18 03:33:31 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ashmem\x00', 0xc0000, 0x0) tee(r0, r1, 0x20, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x9800000000000000) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r3, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r3, &(0x7f0000d1a000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r4, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) listen(r4, 0x404) listen(r3, 0x3) close(r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="d20000002250422efb07533655ffa6f5637d2a6ea5bc8ce0707bbae2b884ad2ad294a90416a602656bc9b4cda758c306f3f11a557c6f69acd874fa25b0abd27a990e120049ddfe8a4d38149a617fe64a28897b1d549d91a9e81baedb8336e45123ca143a3700ff31cbf1a939bc063e6b0945ad5d32d561088586c72f02e6eba63fac0f13e9ba7edcb6207a1f1d02e486c6ee4456e4df2c390911d60354ec803b52eb2b3b63af77290cf04597493e3323c5ff4eedb44bcc029447d33a315b0e95f25e13c9bd7d9a37415beba8ad1aa9492cfe82a25aa7"], &(0x7f00000003c0)=0x2) clone(0x200, &(0x7f0000b6b000), &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80480, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') pread64(r5, &(0x7f00009f3000), 0x352, 0x0) lseek(r5, 0x0, 0x0) getpid() r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r6, 0xaf01, &(0x7f0000675000)=&(0x7f0000989fff)) read(r5, &(0x7f0000000080)=""/93, 0x5d) ioctl$TIOCEXCL(r5, 0x540c) accept4(r5, &(0x7f0000000200)=@vsock={0x0, 0x0, 0x0, @hyper}, &(0x7f0000000300)=0x80, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000017000)='/dev/kvm\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 2033/05/18 03:33:31 executing program 1: r0 = syz_open_dev$binder(&(0x7f00006fe000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000001c0)={'security\x00', 0x2, [{}, {}]}, 0x48) 2033/05/18 03:33:31 executing program 3: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x9e38000000000) 2033/05/18 03:33:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$PIO_UNISCRNMAP(r1, 0x80047456, &(0x7f0000000280)) 2033/05/18 03:33:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='\x00', 0xffffffffffffffff) write$rdma_cm(r0, &(0x7f0000001f00)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001ec0)}}, 0x20) 2033/05/18 03:33:31 executing program 0: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 2033/05/18 03:33:31 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000005ff7)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0xa, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x6012, r4, 0x0) mremap(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000080)) 2033/05/18 03:33:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='\x00', 0xffffffffffffffff) write$rdma_cm(r0, &(0x7f0000001f00)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001ec0)}}, 0x20) 2033/05/18 03:33:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f000006e000)="7f", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ppoll(&(0x7f0000d35ff0)=[{r0}], 0x1, &(0x7f0000542ff0)={0x77359400}, &(0x7f0000ea3000), 0x8) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 2033/05/18 03:33:31 executing program 3: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x9e38000000000) [ 117.149270] x86/PAT: syz-executor6:9152 map pfn RAM range req write-combining for [mem 0x1a9190000-0x1a9193fff], got write-back 2033/05/18 03:33:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='\x00', 0xffffffffffffffff) write$rdma_cm(r0, &(0x7f0000001f00)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001ec0)}}, 0x20) 2033/05/18 03:33:31 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x10, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x54) 2033/05/18 03:33:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='\x00', 0xffffffffffffffff) write$rdma_cm(r0, &(0x7f0000001f00)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001ec0)}}, 0x20) 2033/05/18 03:33:32 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ashmem\x00', 0xc0000, 0x0) tee(r0, r1, 0x20, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x9800000000000000) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r3, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r3, &(0x7f0000d1a000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r4, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) listen(r4, 0x404) listen(r3, 0x3) close(r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="d20000002250422efb07533655ffa6f5637d2a6ea5bc8ce0707bbae2b884ad2ad294a90416a602656bc9b4cda758c306f3f11a557c6f69acd874fa25b0abd27a990e120049ddfe8a4d38149a617fe64a28897b1d549d91a9e81baedb8336e45123ca143a3700ff31cbf1a939bc063e6b0945ad5d32d561088586c72f02e6eba63fac0f13e9ba7edcb6207a1f1d02e486c6ee4456e4df2c390911d60354ec803b52eb2b3b63af77290cf04597493e3323c5ff4eedb44bcc029447d33a315b0e95f25e13c9bd7d9a37415beba8ad1aa9492cfe82a25aa7"], &(0x7f00000003c0)=0x2) clone(0x200, &(0x7f0000b6b000), &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80480, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') pread64(r5, &(0x7f00009f3000), 0x352, 0x0) lseek(r5, 0x0, 0x0) getpid() r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r6, 0xaf01, &(0x7f0000675000)=&(0x7f0000989fff)) read(r5, &(0x7f0000000080)=""/93, 0x5d) ioctl$TIOCEXCL(r5, 0x540c) accept4(r5, &(0x7f0000000200)=@vsock={0x0, 0x0, 0x0, @hyper}, &(0x7f0000000300)=0x80, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000017000)='/dev/kvm\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 2033/05/18 03:33:32 executing program 6: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ashmem\x00', 0xc0000, 0x0) tee(r0, r1, 0x20, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x9800000000000000) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r3, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r3, &(0x7f0000d1a000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r4, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) listen(r4, 0x404) listen(r3, 0x3) close(r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="d20000002250422efb07533655ffa6f5637d2a6ea5bc8ce0707bbae2b884ad2ad294a90416a602656bc9b4cda758c306f3f11a557c6f69acd874fa25b0abd27a990e120049ddfe8a4d38149a617fe64a28897b1d549d91a9e81baedb8336e45123ca143a3700ff31cbf1a939bc063e6b0945ad5d32d561088586c72f02e6eba63fac0f13e9ba7edcb6207a1f1d02e486c6ee4456e4df2c390911d60354ec803b52eb2b3b63af77290cf04597493e3323c5ff4eedb44bcc029447d33a315b0e95f25e13c9bd7d9a37415beba8ad1aa9492cfe82a25aa7"], &(0x7f00000003c0)=0x2) clone(0x200, &(0x7f0000b6b000), &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80480, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') pread64(r5, &(0x7f00009f3000), 0x352, 0x0) lseek(r5, 0x0, 0x0) getpid() r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r6, 0xaf01, &(0x7f0000675000)=&(0x7f0000989fff)) read(r5, &(0x7f0000000080)=""/93, 0x5d) ioctl$TIOCEXCL(r5, 0x540c) accept4(r5, &(0x7f0000000200)=@vsock={0x0, 0x0, 0x0, @hyper}, &(0x7f0000000300)=0x80, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000017000)='/dev/kvm\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 2033/05/18 03:33:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x3, 0x11) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x29, 0x2a, &(0x7f0000000180)) 2033/05/18 03:33:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='\x00', 0xffffffffffffffff) write$rdma_cm(r0, &(0x7f0000001f00)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001ec0)}}, 0x20) 2033/05/18 03:33:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='\x00', 0xffffffffffffffff) write$rdma_cm(r0, &(0x7f0000001f00)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001ec0)}}, 0x20) 2033/05/18 03:33:33 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x10, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x54) 2033/05/18 03:33:33 executing program 6: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ashmem\x00', 0xc0000, 0x0) tee(r0, r1, 0x20, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x9800000000000000) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r3, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r3, &(0x7f0000d1a000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r4, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) listen(r4, 0x404) listen(r3, 0x3) close(r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="d20000002250422efb07533655ffa6f5637d2a6ea5bc8ce0707bbae2b884ad2ad294a90416a602656bc9b4cda758c306f3f11a557c6f69acd874fa25b0abd27a990e120049ddfe8a4d38149a617fe64a28897b1d549d91a9e81baedb8336e45123ca143a3700ff31cbf1a939bc063e6b0945ad5d32d561088586c72f02e6eba63fac0f13e9ba7edcb6207a1f1d02e486c6ee4456e4df2c390911d60354ec803b52eb2b3b63af77290cf04597493e3323c5ff4eedb44bcc029447d33a315b0e95f25e13c9bd7d9a37415beba8ad1aa9492cfe82a25aa7"], &(0x7f00000003c0)=0x2) clone(0x200, &(0x7f0000b6b000), &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80480, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') pread64(r5, &(0x7f00009f3000), 0x352, 0x0) lseek(r5, 0x0, 0x0) getpid() r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r6, 0xaf01, &(0x7f0000675000)=&(0x7f0000989fff)) read(r5, &(0x7f0000000080)=""/93, 0x5d) ioctl$TIOCEXCL(r5, 0x540c) accept4(r5, &(0x7f0000000200)=@vsock={0x0, 0x0, 0x0, @hyper}, &(0x7f0000000300)=0x80, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000017000)='/dev/kvm\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 2033/05/18 03:33:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f000006e000)="7f", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ppoll(&(0x7f0000d35ff0)=[{r0}], 0x1, &(0x7f0000542ff0)={0x77359400}, &(0x7f0000ea3000), 0x8) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 2033/05/18 03:33:33 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ashmem\x00', 0xc0000, 0x0) tee(r0, r1, 0x20, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x9800000000000000) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r3, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r3, &(0x7f0000d1a000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r4, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) listen(r4, 0x404) listen(r3, 0x3) close(r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="d20000002250422efb07533655ffa6f5637d2a6ea5bc8ce0707bbae2b884ad2ad294a90416a602656bc9b4cda758c306f3f11a557c6f69acd874fa25b0abd27a990e120049ddfe8a4d38149a617fe64a28897b1d549d91a9e81baedb8336e45123ca143a3700ff31cbf1a939bc063e6b0945ad5d32d561088586c72f02e6eba63fac0f13e9ba7edcb6207a1f1d02e486c6ee4456e4df2c390911d60354ec803b52eb2b3b63af77290cf04597493e3323c5ff4eedb44bcc029447d33a315b0e95f25e13c9bd7d9a37415beba8ad1aa9492cfe82a25aa7"], &(0x7f00000003c0)=0x2) clone(0x200, &(0x7f0000b6b000), &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80480, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') pread64(r5, &(0x7f00009f3000), 0x352, 0x0) lseek(r5, 0x0, 0x0) getpid() r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r6, 0xaf01, &(0x7f0000675000)=&(0x7f0000989fff)) read(r5, &(0x7f0000000080)=""/93, 0x5d) ioctl$TIOCEXCL(r5, 0x540c) accept4(r5, &(0x7f0000000200)=@vsock={0x0, 0x0, 0x0, @hyper}, &(0x7f0000000300)=0x80, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000017000)='/dev/kvm\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 2033/05/18 03:33:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f000006e000)="7f", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ppoll(&(0x7f0000d35ff0)=[{r0}], 0x1, &(0x7f0000542ff0)={0x77359400}, &(0x7f0000ea3000), 0x8) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 2033/05/18 03:33:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f000006e000)="7f", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ppoll(&(0x7f0000d35ff0)=[{r0}], 0x1, &(0x7f0000542ff0)={0x77359400}, &(0x7f0000ea3000), 0x8) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 2033/05/18 03:33:33 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x10, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x54) 2033/05/18 03:33:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000c02fca)="6e732f6d6e7400c552c5ba9e2c33e308163dd83bbbef1a23efb866ab2c1b66c09db90000000000000006f4d0e9ae0e19c79a35b158ae") setns(r0, 0x0) 2033/05/18 03:33:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x3, 0x11) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x29, 0x2a, &(0x7f0000000180)) 2033/05/18 03:33:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000c02fca)="6e732f6d6e7400c552c5ba9e2c33e308163dd83bbbef1a23efb866ab2c1b66c09db90000000000000006f4d0e9ae0e19c79a35b158ae") setns(r0, 0x0) 2033/05/18 03:33:34 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ashmem\x00', 0xc0000, 0x0) tee(r0, r1, 0x20, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x9800000000000000) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r3, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r3, &(0x7f0000d1a000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r4, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) listen(r4, 0x404) listen(r3, 0x3) close(r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="d20000002250422efb07533655ffa6f5637d2a6ea5bc8ce0707bbae2b884ad2ad294a90416a602656bc9b4cda758c306f3f11a557c6f69acd874fa25b0abd27a990e120049ddfe8a4d38149a617fe64a28897b1d549d91a9e81baedb8336e45123ca143a3700ff31cbf1a939bc063e6b0945ad5d32d561088586c72f02e6eba63fac0f13e9ba7edcb6207a1f1d02e486c6ee4456e4df2c390911d60354ec803b52eb2b3b63af77290cf04597493e3323c5ff4eedb44bcc029447d33a315b0e95f25e13c9bd7d9a37415beba8ad1aa9492cfe82a25aa7"], &(0x7f00000003c0)=0x2) clone(0x200, &(0x7f0000b6b000), &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80480, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') pread64(r5, &(0x7f00009f3000), 0x352, 0x0) lseek(r5, 0x0, 0x0) getpid() r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r6, 0xaf01, &(0x7f0000675000)=&(0x7f0000989fff)) read(r5, &(0x7f0000000080)=""/93, 0x5d) ioctl$TIOCEXCL(r5, 0x540c) accept4(r5, &(0x7f0000000200)=@vsock={0x0, 0x0, 0x0, @hyper}, &(0x7f0000000300)=0x80, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000017000)='/dev/kvm\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 2033/05/18 03:33:34 executing program 6: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ashmem\x00', 0xc0000, 0x0) tee(r0, r1, 0x20, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x9800000000000000) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r3, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r3, &(0x7f0000d1a000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r4, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) listen(r4, 0x404) listen(r3, 0x3) close(r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="d20000002250422efb07533655ffa6f5637d2a6ea5bc8ce0707bbae2b884ad2ad294a90416a602656bc9b4cda758c306f3f11a557c6f69acd874fa25b0abd27a990e120049ddfe8a4d38149a617fe64a28897b1d549d91a9e81baedb8336e45123ca143a3700ff31cbf1a939bc063e6b0945ad5d32d561088586c72f02e6eba63fac0f13e9ba7edcb6207a1f1d02e486c6ee4456e4df2c390911d60354ec803b52eb2b3b63af77290cf04597493e3323c5ff4eedb44bcc029447d33a315b0e95f25e13c9bd7d9a37415beba8ad1aa9492cfe82a25aa7"], &(0x7f00000003c0)=0x2) clone(0x200, &(0x7f0000b6b000), &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80480, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') pread64(r5, &(0x7f00009f3000), 0x352, 0x0) lseek(r5, 0x0, 0x0) getpid() r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r6, 0xaf01, &(0x7f0000675000)=&(0x7f0000989fff)) read(r5, &(0x7f0000000080)=""/93, 0x5d) ioctl$TIOCEXCL(r5, 0x540c) accept4(r5, &(0x7f0000000200)=@vsock={0x0, 0x0, 0x0, @hyper}, &(0x7f0000000300)=0x80, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000017000)='/dev/kvm\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 2033/05/18 03:33:34 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x10, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x54) 2033/05/18 03:33:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f000006e000)="7f", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ppoll(&(0x7f0000d35ff0)=[{r0}], 0x1, &(0x7f0000542ff0)={0x77359400}, &(0x7f0000ea3000), 0x8) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 2033/05/18 03:33:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f000006e000)="7f", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ppoll(&(0x7f0000d35ff0)=[{r0}], 0x1, &(0x7f0000542ff0)={0x77359400}, &(0x7f0000ea3000), 0x8) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 2033/05/18 03:33:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f000006e000)="7f", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ppoll(&(0x7f0000d35ff0)=[{r0}], 0x1, &(0x7f0000542ff0)={0x77359400}, &(0x7f0000ea3000), 0x8) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 2033/05/18 03:33:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x3, 0x11) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x29, 0x2a, &(0x7f0000000180)) 2033/05/18 03:33:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000c02fca)="6e732f6d6e7400c552c5ba9e2c33e308163dd83bbbef1a23efb866ab2c1b66c09db90000000000000006f4d0e9ae0e19c79a35b158ae") setns(r0, 0x0) 2033/05/18 03:33:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x3, 0x11) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x29, 0x2a, &(0x7f0000000180)) 2033/05/18 03:33:34 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xa, 0x1, 0x7f, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040), &(0x7f0000000140), 0x5}, 0x20) 2033/05/18 03:33:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000c02fca)="6e732f6d6e7400c552c5ba9e2c33e308163dd83bbbef1a23efb866ab2c1b66c09db90000000000000006f4d0e9ae0e19c79a35b158ae") setns(r0, 0x0) 2033/05/18 03:33:34 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt(r0, 0x40000000000006, 0x20, &(0x7f00000ac000)="02000000", 0x4) 2033/05/18 03:33:34 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xa, 0x1, 0x7f, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040), &(0x7f0000000140), 0x5}, 0x20) 2033/05/18 03:33:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47, 0xfffffffffffffffc}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x4b4, &(0x7f00001a7f05)=""/251}, 0x48) 2033/05/18 03:33:34 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x12002, 0x63) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa8, r2, 0x800, 0x70bd2a, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000001}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x382}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4}, 0x4) ioctl$sock_bt(r0, 0x8906, &(0x7f0000000000)) 2033/05/18 03:33:34 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt(r0, 0x40000000000006, 0x20, &(0x7f00000ac000)="02000000", 0x4) 2033/05/18 03:33:34 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt(r0, 0x40000000000006, 0x20, &(0x7f00000ac000)="02000000", 0x4) 2033/05/18 03:33:34 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xa, 0x1, 0x7f, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040), &(0x7f0000000140), 0x5}, 0x20) 2033/05/18 03:33:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x80, 0x101000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0x9, 0x80000000}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000340)={r2, 0x8000, 0x7a2}, &(0x7f0000000380)=0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="000928bd7000fddbdf25f11bde7a4b081bda07000000"], 0x2}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x80000000}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={r3, 0x1}, 0x8) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f000012a000)=[{&(0x7f0000000000)="290000002000190700003fffffffda060200000622e800e53b0000150d000400ebffffff00d200019c", 0x29}], 0x1) 2033/05/18 03:33:34 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x12002, 0x63) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa8, r2, 0x800, 0x70bd2a, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000001}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x382}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4}, 0x4) ioctl$sock_bt(r0, 0x8906, &(0x7f0000000000)) [ 120.010301] netlink: 'syz-executor2': attribute type 4 has an invalid length. 2033/05/18 03:33:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47, 0xfffffffffffffffc}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x4b4, &(0x7f00001a7f05)=""/251}, 0x48) 2033/05/18 03:33:35 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt(r0, 0x40000000000006, 0x20, &(0x7f00000ac000)="02000000", 0x4) 2033/05/18 03:33:35 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xa, 0x1, 0x7f, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040), &(0x7f0000000140), 0x5}, 0x20) 2033/05/18 03:33:35 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x12002, 0x63) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa8, r2, 0x800, 0x70bd2a, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000001}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x382}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4}, 0x4) ioctl$sock_bt(r0, 0x8906, &(0x7f0000000000)) 2033/05/18 03:33:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x80, 0x101000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0x9, 0x80000000}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000340)={r2, 0x8000, 0x7a2}, &(0x7f0000000380)=0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="000928bd7000fddbdf25f11bde7a4b081bda07000000"], 0x2}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x80000000}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={r3, 0x1}, 0x8) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f000012a000)=[{&(0x7f0000000000)="290000002000190700003fffffffda060200000622e800e53b0000150d000400ebffffff00d200019c", 0x29}], 0x1) 2033/05/18 03:33:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f000006e000)="7f", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ppoll(&(0x7f0000d35ff0)=[{r0}], 0x1, &(0x7f0000542ff0)={0x77359400}, &(0x7f0000ea3000), 0x8) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 2033/05/18 03:33:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f000006e000)="7f", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ppoll(&(0x7f0000d35ff0)=[{r0}], 0x1, &(0x7f0000542ff0)={0x77359400}, &(0x7f0000ea3000), 0x8) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 2033/05/18 03:33:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f000006e000)="7f", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ppoll(&(0x7f0000d35ff0)=[{r0}], 0x1, &(0x7f0000542ff0)={0x77359400}, &(0x7f0000ea3000), 0x8) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 2033/05/18 03:33:35 executing program 7: r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000006000)) read(r2, &(0x7f0000000200)=""/90, 0xedf40ca8) r3 = memfd_create(&(0x7f0000000380)="51eb0b6cd3307387d79b8343e4c0f3a0650dfd2521d7c4ceddbf3cb126e1a4263cfdf578ed87c27461e2748b8a752572d384fc3975129b4b46cae43833764cf878594d66a297a3b36761d8e4ca7cf55cd32324829ce12584d0dd644e61065009f390b981cb2e5d0fc33397297f84f7f826a02b5e85491c3f4a040d3650739c791e3cf9068a7e0397743f07e4d156a0c43e532c154164904b4bdec2481bf373ec7a0d63c6860f11775e8b4d881f59066c1a8cd7569ac6e1cdb901", 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/102, 0x66}], 0x1) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x12, r3, 0x0) 2033/05/18 03:33:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x127ff, 0x0, 0x0, 0x2000, &(0x7f000000c000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00000d5000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f0000bfefbf)="0f20d835200000000f22d80f0118470f35f3ab77644ebe0f59128182818201bc8c6a000000674b0f015e9dc483996ba7d900f300004f4f21ae5ddc", 0x3b}], 0x1, 0x0, &(0x7f0000753ff0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2033/05/18 03:33:35 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x12002, 0x63) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa8, r2, 0x800, 0x70bd2a, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000001}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x382}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4}, 0x4) ioctl$sock_bt(r0, 0x8906, &(0x7f0000000000)) [ 120.601349] netlink: 'syz-executor2': attribute type 4 has an invalid length. 2033/05/18 03:33:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x80, 0x101000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0x9, 0x80000000}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000340)={r2, 0x8000, 0x7a2}, &(0x7f0000000380)=0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="000928bd7000fddbdf25f11bde7a4b081bda07000000"], 0x2}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x80000000}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={r3, 0x1}, 0x8) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f000012a000)=[{&(0x7f0000000000)="290000002000190700003fffffffda060200000622e800e53b0000150d000400ebffffff00d200019c", 0x29}], 0x1) 2033/05/18 03:33:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47, 0xfffffffffffffffc}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x4b4, &(0x7f00001a7f05)=""/251}, 0x48) 2033/05/18 03:33:35 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x4d072, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 120.712320] netlink: 'syz-executor2': attribute type 4 has an invalid length. 2033/05/18 03:33:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47, 0xfffffffffffffffc}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x4b4, &(0x7f00001a7f05)=""/251}, 0x48) 2033/05/18 03:33:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x80, 0x101000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0x9, 0x80000000}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000340)={r2, 0x8000, 0x7a2}, &(0x7f0000000380)=0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="000928bd7000fddbdf25f11bde7a4b081bda07000000"], 0x2}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x80000000}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={r3, 0x1}, 0x8) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f000012a000)=[{&(0x7f0000000000)="290000002000190700003fffffffda060200000622e800e53b0000150d000400ebffffff00d200019c", 0x29}], 0x1) [ 120.853828] netlink: 'syz-executor2': attribute type 4 has an invalid length. 2033/05/18 03:33:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x127ff, 0x0, 0x0, 0x2000, &(0x7f000000c000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00000d5000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f0000bfefbf)="0f20d835200000000f22d80f0118470f35f3ab77644ebe0f59128182818201bc8c6a000000674b0f015e9dc483996ba7d900f300004f4f21ae5ddc", 0x3b}], 0x1, 0x0, &(0x7f0000753ff0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2033/05/18 03:33:36 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x4d072, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2033/05/18 03:33:36 executing program 4: set_mempolicy(0x4001, &(0x7f0000000000)=0x4, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x9, 0x800000209e1f, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/67}, 0x18) 2033/05/18 03:33:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000ffffff00000000430000000f"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 2033/05/18 03:33:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000133ffc), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/4096, 0xfea7}], 0x1) 2033/05/18 03:33:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x4d072, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2033/05/18 03:33:36 executing program 7: r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000006000)) read(r2, &(0x7f0000000200)=""/90, 0xedf40ca8) r3 = memfd_create(&(0x7f0000000380)="51eb0b6cd3307387d79b8343e4c0f3a0650dfd2521d7c4ceddbf3cb126e1a4263cfdf578ed87c27461e2748b8a752572d384fc3975129b4b46cae43833764cf878594d66a297a3b36761d8e4ca7cf55cd32324829ce12584d0dd644e61065009f390b981cb2e5d0fc33397297f84f7f826a02b5e85491c3f4a040d3650739c791e3cf9068a7e0397743f07e4d156a0c43e532c154164904b4bdec2481bf373ec7a0d63c6860f11775e8b4d881f59066c1a8cd7569ac6e1cdb901", 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/102, 0x66}], 0x1) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x12, r3, 0x0) 2033/05/18 03:33:36 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000180)=0xfffffffffffffc83, 0x0) read(r1, &(0x7f0000000500)=""/166, 0xa6) 2033/05/18 03:33:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000ffffff00000000430000000f"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 2033/05/18 03:33:36 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x4d072, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2033/05/18 03:33:36 executing program 4: set_mempolicy(0x4001, &(0x7f0000000000)=0x4, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x9, 0x800000209e1f, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/67}, 0x18) 2033/05/18 03:33:36 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000180)=0xfffffffffffffc83, 0x0) read(r1, &(0x7f0000000500)=""/166, 0xa6) 2033/05/18 03:33:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x4d072, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2033/05/18 03:33:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000133ffc), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/4096, 0xfea7}], 0x1) 2033/05/18 03:33:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x127ff, 0x0, 0x0, 0x2000, &(0x7f000000c000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00000d5000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f0000bfefbf)="0f20d835200000000f22d80f0118470f35f3ab77644ebe0f59128182818201bc8c6a000000674b0f015e9dc483996ba7d900f300004f4f21ae5ddc", 0x3b}], 0x1, 0x0, &(0x7f0000753ff0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2033/05/18 03:33:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000ffffff00000000430000000f"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 2033/05/18 03:33:36 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000180)=0xfffffffffffffc83, 0x0) read(r1, &(0x7f0000000500)=""/166, 0xa6) 2033/05/18 03:33:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000133ffc), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/4096, 0xfea7}], 0x1) 2033/05/18 03:33:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x4d072, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2033/05/18 03:33:36 executing program 4: set_mempolicy(0x4001, &(0x7f0000000000)=0x4, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x9, 0x800000209e1f, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/67}, 0x18) 2033/05/18 03:33:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000ffffff00000000430000000f"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 2033/05/18 03:33:37 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x4d072, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2033/05/18 03:33:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x127ff, 0x0, 0x0, 0x2000, &(0x7f000000c000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00000d5000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f0000bfefbf)="0f20d835200000000f22d80f0118470f35f3ab77644ebe0f59128182818201bc8c6a000000674b0f015e9dc483996ba7d900f300004f4f21ae5ddc", 0x3b}], 0x1, 0x0, &(0x7f0000753ff0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2033/05/18 03:33:37 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000180)=0xfffffffffffffc83, 0x0) read(r1, &(0x7f0000000500)=""/166, 0xa6) 2033/05/18 03:33:37 executing program 2: set_mempolicy(0x4001, &(0x7f0000000000)=0x4, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x9, 0x800000209e1f, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/67}, 0x18) 2033/05/18 03:33:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000133ffc), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/4096, 0xfea7}], 0x1) 2033/05/18 03:33:37 executing program 4: set_mempolicy(0x4001, &(0x7f0000000000)=0x4, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x9, 0x800000209e1f, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/67}, 0x18) 2033/05/18 03:33:37 executing program 7: r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000006000)) read(r2, &(0x7f0000000200)=""/90, 0xedf40ca8) r3 = memfd_create(&(0x7f0000000380)="51eb0b6cd3307387d79b8343e4c0f3a0650dfd2521d7c4ceddbf3cb126e1a4263cfdf578ed87c27461e2748b8a752572d384fc3975129b4b46cae43833764cf878594d66a297a3b36761d8e4ca7cf55cd32324829ce12584d0dd644e61065009f390b981cb2e5d0fc33397297f84f7f826a02b5e85491c3f4a040d3650739c791e3cf9068a7e0397743f07e4d156a0c43e532c154164904b4bdec2481bf373ec7a0d63c6860f11775e8b4d881f59066c1a8cd7569ac6e1cdb901", 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/102, 0x66}], 0x1) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x12, r3, 0x0) 2033/05/18 03:33:37 executing program 1: set_mempolicy(0x4001, &(0x7f0000000000)=0x4, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x9, 0x800000209e1f, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/67}, 0x18) 2033/05/18 03:33:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x127ff, 0x0, 0x0, 0x2000, &(0x7f000000c000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00000d5000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f0000bfefbf)="0f20d835200000000f22d80f0118470f35f3ab77644ebe0f59128182818201bc8c6a000000674b0f015e9dc483996ba7d900f300004f4f21ae5ddc", 0x3b}], 0x1, 0x0, &(0x7f0000753ff0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2033/05/18 03:33:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x127ff, 0x0, 0x0, 0x2000, &(0x7f000000c000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00000d5000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f0000bfefbf)="0f20d835200000000f22d80f0118470f35f3ab77644ebe0f59128182818201bc8c6a000000674b0f015e9dc483996ba7d900f300004f4f21ae5ddc", 0x3b}], 0x1, 0x0, &(0x7f0000753ff0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2033/05/18 03:33:37 executing program 1: set_mempolicy(0x4001, &(0x7f0000000000)=0x4, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x9, 0x800000209e1f, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/67}, 0x18) 2033/05/18 03:33:37 executing program 2: set_mempolicy(0x4001, &(0x7f0000000000)=0x4, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x9, 0x800000209e1f, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/67}, 0x18) 2033/05/18 03:33:37 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000006000)) read(r2, &(0x7f0000000200)=""/90, 0xedf40ca8) r3 = memfd_create(&(0x7f0000000380)="51eb0b6cd3307387d79b8343e4c0f3a0650dfd2521d7c4ceddbf3cb126e1a4263cfdf578ed87c27461e2748b8a752572d384fc3975129b4b46cae43833764cf878594d66a297a3b36761d8e4ca7cf55cd32324829ce12584d0dd644e61065009f390b981cb2e5d0fc33397297f84f7f826a02b5e85491c3f4a040d3650739c791e3cf9068a7e0397743f07e4d156a0c43e532c154164904b4bdec2481bf373ec7a0d63c6860f11775e8b4d881f59066c1a8cd7569ac6e1cdb901", 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/102, 0x66}], 0x1) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x12, r3, 0x0) 2033/05/18 03:33:38 executing program 7: r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000006000)) read(r2, &(0x7f0000000200)=""/90, 0xedf40ca8) r3 = memfd_create(&(0x7f0000000380)="51eb0b6cd3307387d79b8343e4c0f3a0650dfd2521d7c4ceddbf3cb126e1a4263cfdf578ed87c27461e2748b8a752572d384fc3975129b4b46cae43833764cf878594d66a297a3b36761d8e4ca7cf55cd32324829ce12584d0dd644e61065009f390b981cb2e5d0fc33397297f84f7f826a02b5e85491c3f4a040d3650739c791e3cf9068a7e0397743f07e4d156a0c43e532c154164904b4bdec2481bf373ec7a0d63c6860f11775e8b4d881f59066c1a8cd7569ac6e1cdb901", 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/102, 0x66}], 0x1) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x12, r3, 0x0) 2033/05/18 03:33:38 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0xffffffffffffffff, 0x0, r0, 0x0) 2033/05/18 03:33:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x127ff, 0x0, 0x0, 0x2000, &(0x7f000000c000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00000d5000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f0000bfefbf)="0f20d835200000000f22d80f0118470f35f3ab77644ebe0f59128182818201bc8c6a000000674b0f015e9dc483996ba7d900f300004f4f21ae5ddc", 0x3b}], 0x1, 0x0, &(0x7f0000753ff0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2033/05/18 03:33:38 executing program 1: set_mempolicy(0x4001, &(0x7f0000000000)=0x4, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x9, 0x800000209e1f, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/67}, 0x18) 2033/05/18 03:33:38 executing program 2: set_mempolicy(0x4001, &(0x7f0000000000)=0x4, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x9, 0x800000209e1f, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/67}, 0x18) 2033/05/18 03:33:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x127ff, 0x0, 0x0, 0x2000, &(0x7f000000c000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00000d5000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f0000bfefbf)="0f20d835200000000f22d80f0118470f35f3ab77644ebe0f59128182818201bc8c6a000000674b0f015e9dc483996ba7d900f300004f4f21ae5ddc", 0x3b}], 0x1, 0x0, &(0x7f0000753ff0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2033/05/18 03:33:38 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000006000)) read(r2, &(0x7f0000000200)=""/90, 0xedf40ca8) r3 = memfd_create(&(0x7f0000000380)="51eb0b6cd3307387d79b8343e4c0f3a0650dfd2521d7c4ceddbf3cb126e1a4263cfdf578ed87c27461e2748b8a752572d384fc3975129b4b46cae43833764cf878594d66a297a3b36761d8e4ca7cf55cd32324829ce12584d0dd644e61065009f390b981cb2e5d0fc33397297f84f7f826a02b5e85491c3f4a040d3650739c791e3cf9068a7e0397743f07e4d156a0c43e532c154164904b4bdec2481bf373ec7a0d63c6860f11775e8b4d881f59066c1a8cd7569ac6e1cdb901", 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/102, 0x66}], 0x1) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x12, r3, 0x0) 2033/05/18 03:33:38 executing program 3: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080), 0x4) 2033/05/18 03:33:39 executing program 3: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080), 0x4) 2033/05/18 03:33:39 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0xffffffffffffffff, 0x0, r0, 0x0) 2033/05/18 03:33:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x127ff, 0x0, 0x0, 0x2000, &(0x7f000000c000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00000d5000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f0000bfefbf)="0f20d835200000000f22d80f0118470f35f3ab77644ebe0f59128182818201bc8c6a000000674b0f015e9dc483996ba7d900f300004f4f21ae5ddc", 0x3b}], 0x1, 0x0, &(0x7f0000753ff0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2033/05/18 03:33:39 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0xffffffffffffffff, 0x0, r0, 0x0) 2033/05/18 03:33:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x127ff, 0x0, 0x0, 0x2000, &(0x7f000000c000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00000d5000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f0000bfefbf)="0f20d835200000000f22d80f0118470f35f3ab77644ebe0f59128182818201bc8c6a000000674b0f015e9dc483996ba7d900f300004f4f21ae5ddc", 0x3b}], 0x1, 0x0, &(0x7f0000753ff0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2033/05/18 03:33:39 executing program 1: syz_emit_ethernet(0x230, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2033/05/18 03:33:39 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000006000)) read(r2, &(0x7f0000000200)=""/90, 0xedf40ca8) r3 = memfd_create(&(0x7f0000000380)="51eb0b6cd3307387d79b8343e4c0f3a0650dfd2521d7c4ceddbf3cb126e1a4263cfdf578ed87c27461e2748b8a752572d384fc3975129b4b46cae43833764cf878594d66a297a3b36761d8e4ca7cf55cd32324829ce12584d0dd644e61065009f390b981cb2e5d0fc33397297f84f7f826a02b5e85491c3f4a040d3650739c791e3cf9068a7e0397743f07e4d156a0c43e532c154164904b4bdec2481bf373ec7a0d63c6860f11775e8b4d881f59066c1a8cd7569ac6e1cdb901", 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/102, 0x66}], 0x1) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x12, r3, 0x0) 2033/05/18 03:33:39 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = getpgrp(0x0) prlimit64(r2, 0x0, 0x0, &(0x7f00000001c0)) 2033/05/18 03:33:39 executing program 3: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080), 0x4) 2033/05/18 03:33:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x200e000, 0x1, &(0x7f0000000280)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_aout(r0, &(0x7f0000000680), 0x20) ftruncate(r0, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', '%eth1)vboxnet0eth1trusted#\x00'}, &(0x7f0000000100)='vfat\x00', 0x5, 0x0) 2033/05/18 03:33:39 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0xffffffffffffffff, 0x0, r0, 0x0) 2033/05/18 03:33:39 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0xffffffffffffffff, 0x0, r0, 0x0) 2033/05/18 03:33:39 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = getpgrp(0x0) prlimit64(r2, 0x0, 0x0, &(0x7f00000001c0)) 2033/05/18 03:33:39 executing program 4: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt(r0, 0x114, 0xa, &(0x7f0000000400)="040011e2", 0x4) 2033/05/18 03:33:39 executing program 5: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x1, {0x2, 0x4e23}, {0x2, 0x4e21, @broadcast=0xffffffff}, {0x2, 0x4e22}, 0x281, 0x8, 0xffffffff, 0x401, 0x3, &(0x7f0000000100)='yam0\x00', 0x2, 0x5}) shutdown(r0, 0x2) ppoll(&(0x7f0000001fd8)=[{r0}], 0x1, &(0x7f0000001000)={0x77359400}, &(0x7f0000001000), 0x8) 2033/05/18 03:33:39 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0xffffffffffffffff, 0x0, r0, 0x0) 2033/05/18 03:33:39 executing program 3: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080), 0x4) 2033/05/18 03:33:39 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0xffffffffffffffff, 0x0, r0, 0x0) 2033/05/18 03:33:39 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = getpgrp(0x0) prlimit64(r2, 0x0, 0x0, &(0x7f00000001c0)) 2033/05/18 03:33:40 executing program 4: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt(r0, 0x114, 0xa, &(0x7f0000000400)="040011e2", 0x4) 2033/05/18 03:33:40 executing program 5: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x1, {0x2, 0x4e23}, {0x2, 0x4e21, @broadcast=0xffffffff}, {0x2, 0x4e22}, 0x281, 0x8, 0xffffffff, 0x401, 0x3, &(0x7f0000000100)='yam0\x00', 0x2, 0x5}) shutdown(r0, 0x2) ppoll(&(0x7f0000001fd8)=[{r0}], 0x1, &(0x7f0000001000)={0x77359400}, &(0x7f0000001000), 0x8) [ 125.293642] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 125.301754] FAT-fs (loop1): Filesystem has been set read-only [ 125.406553] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 2033/05/18 03:33:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x200e000, 0x1, &(0x7f0000000280)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_aout(r0, &(0x7f0000000680), 0x20) ftruncate(r0, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', '%eth1)vboxnet0eth1trusted#\x00'}, &(0x7f0000000100)='vfat\x00', 0x5, 0x0) 2033/05/18 03:33:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x200e000, 0x1, &(0x7f0000000280)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_aout(r0, &(0x7f0000000680), 0x20) ftruncate(r0, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', '%eth1)vboxnet0eth1trusted#\x00'}, &(0x7f0000000100)='vfat\x00', 0x5, 0x0) 2033/05/18 03:33:40 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:40 executing program 4: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt(r0, 0x114, 0xa, &(0x7f0000000400)="040011e2", 0x4) 2033/05/18 03:33:40 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x1, {0x2, 0x4e23}, {0x2, 0x4e21, @broadcast=0xffffffff}, {0x2, 0x4e22}, 0x281, 0x8, 0xffffffff, 0x401, 0x3, &(0x7f0000000100)='yam0\x00', 0x2, 0x5}) shutdown(r0, 0x2) ppoll(&(0x7f0000001fd8)=[{r0}], 0x1, &(0x7f0000001000)={0x77359400}, &(0x7f0000001000), 0x8) 2033/05/18 03:33:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0c0000010ea6b91460bc7f15369dafa8"], &(0x7f0000000080)=0x2) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000000100)}}, {{&(0x7f0000000000)=@nfc={0x27}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000000)=[{0x18, 0x1, 0x1, "fc"}], 0x18}}], 0x2, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x800, 0x4b) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) accept4(r0, &(0x7f00000003c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000440)=0x80, 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'syz_tun\x00', 0x3000}) getsockname$ax25(r2, &(0x7f0000000480), &(0x7f00000004c0)=0x10) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000001c0)=@ax25, 0x80, &(0x7f0000000800)=[{&(0x7f0000000240)=""/138, 0x8a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/226, 0xe2}, {&(0x7f0000000300)=""/159, 0x9f}, {&(0x7f0000000600)=""/95, 0x5f}, {&(0x7f0000000680)=""/43, 0x2b}, {&(0x7f00000006c0)=""/83, 0x53}, {&(0x7f0000000740)=""/71, 0x47}, {&(0x7f00000007c0)=""/46, 0x2e}], 0x9, &(0x7f0000000880)=""/179, 0xb3, 0x8000}, 0x40000001) 2033/05/18 03:33:40 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = getpgrp(0x0) prlimit64(r2, 0x0, 0x0, &(0x7f00000001c0)) 2033/05/18 03:33:40 executing program 5: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x1, {0x2, 0x4e23}, {0x2, 0x4e21, @broadcast=0xffffffff}, {0x2, 0x4e22}, 0x281, 0x8, 0xffffffff, 0x401, 0x3, &(0x7f0000000100)='yam0\x00', 0x2, 0x5}) shutdown(r0, 0x2) ppoll(&(0x7f0000001fd8)=[{r0}], 0x1, &(0x7f0000001000)={0x77359400}, &(0x7f0000001000), 0x8) 2033/05/18 03:33:40 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x1, {0x2, 0x4e23}, {0x2, 0x4e21, @broadcast=0xffffffff}, {0x2, 0x4e22}, 0x281, 0x8, 0xffffffff, 0x401, 0x3, &(0x7f0000000100)='yam0\x00', 0x2, 0x5}) shutdown(r0, 0x2) ppoll(&(0x7f0000001fd8)=[{r0}], 0x1, &(0x7f0000001000)={0x77359400}, &(0x7f0000001000), 0x8) 2033/05/18 03:33:40 executing program 5: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x1, {0x2, 0x4e23}, {0x2, 0x4e21, @broadcast=0xffffffff}, {0x2, 0x4e22}, 0x281, 0x8, 0xffffffff, 0x401, 0x3, &(0x7f0000000100)='yam0\x00', 0x2, 0x5}) shutdown(r0, 0x2) ppoll(&(0x7f0000001fd8)=[{r0}], 0x1, &(0x7f0000001000)={0x77359400}, &(0x7f0000001000), 0x8) 2033/05/18 03:33:40 executing program 4: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt(r0, 0x114, 0xa, &(0x7f0000000400)="040011e2", 0x4) 2033/05/18 03:33:40 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(tea)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="11f0ce816e3e86e498ffde8e889d90a0e2094b9bb7a41a392264b1bbde25b30bdb6b7b64921a26363de055d9cbbf12998ec04f0e29a9c1f44fa642ff9ba5e94936fc03ad9e0e3ad1f0cc82444e6498e25bfddbad6a3b22ccee2edda118d6f29223705bd0962e340e", 0x68}], 0x1, &(0x7f0000000000)}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x75}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2033/05/18 03:33:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0c0000010ea6b91460bc7f15369dafa8"], &(0x7f0000000080)=0x2) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000000100)}}, {{&(0x7f0000000000)=@nfc={0x27}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000000)=[{0x18, 0x1, 0x1, "fc"}], 0x18}}], 0x2, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x800, 0x4b) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) accept4(r0, &(0x7f00000003c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000440)=0x80, 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'syz_tun\x00', 0x3000}) getsockname$ax25(r2, &(0x7f0000000480), &(0x7f00000004c0)=0x10) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000001c0)=@ax25, 0x80, &(0x7f0000000800)=[{&(0x7f0000000240)=""/138, 0x8a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/226, 0xe2}, {&(0x7f0000000300)=""/159, 0x9f}, {&(0x7f0000000600)=""/95, 0x5f}, {&(0x7f0000000680)=""/43, 0x2b}, {&(0x7f00000006c0)=""/83, 0x53}, {&(0x7f0000000740)=""/71, 0x47}, {&(0x7f00000007c0)=""/46, 0x2e}], 0x9, &(0x7f0000000880)=""/179, 0xb3, 0x8000}, 0x40000001) 2033/05/18 03:33:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0c0000010ea6b91460bc7f15369dafa8"], &(0x7f0000000080)=0x2) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000000100)}}, {{&(0x7f0000000000)=@nfc={0x27}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000000)=[{0x18, 0x1, 0x1, "fc"}], 0x18}}], 0x2, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x800, 0x4b) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) accept4(r0, &(0x7f00000003c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000440)=0x80, 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'syz_tun\x00', 0x3000}) getsockname$ax25(r2, &(0x7f0000000480), &(0x7f00000004c0)=0x10) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000001c0)=@ax25, 0x80, &(0x7f0000000800)=[{&(0x7f0000000240)=""/138, 0x8a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/226, 0xe2}, {&(0x7f0000000300)=""/159, 0x9f}, {&(0x7f0000000600)=""/95, 0x5f}, {&(0x7f0000000680)=""/43, 0x2b}, {&(0x7f00000006c0)=""/83, 0x53}, {&(0x7f0000000740)=""/71, 0x47}, {&(0x7f00000007c0)=""/46, 0x2e}], 0x9, &(0x7f0000000880)=""/179, 0xb3, 0x8000}, 0x40000001) [ 126.275570] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 126.283498] FAT-fs (loop2): Filesystem has been set read-only [ 126.292955] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 126.300863] FAT-fs (loop1): Filesystem has been set read-only 2033/05/18 03:33:41 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:41 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x1, {0x2, 0x4e23}, {0x2, 0x4e21, @broadcast=0xffffffff}, {0x2, 0x4e22}, 0x281, 0x8, 0xffffffff, 0x401, 0x3, &(0x7f0000000100)='yam0\x00', 0x2, 0x5}) shutdown(r0, 0x2) ppoll(&(0x7f0000001fd8)=[{r0}], 0x1, &(0x7f0000001000)={0x77359400}, &(0x7f0000001000), 0x8) 2033/05/18 03:33:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000180)=@migrate_id={0x16, 0x10, 0xfa00}, 0x18) 2033/05/18 03:33:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(tea)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="11f0ce816e3e86e498ffde8e889d90a0e2094b9bb7a41a392264b1bbde25b30bdb6b7b64921a26363de055d9cbbf12998ec04f0e29a9c1f44fa642ff9ba5e94936fc03ad9e0e3ad1f0cc82444e6498e25bfddbad6a3b22ccee2edda118d6f29223705bd0962e340e", 0x68}], 0x1, &(0x7f0000000000)}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x75}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2033/05/18 03:33:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0c0000010ea6b91460bc7f15369dafa8"], &(0x7f0000000080)=0x2) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000000100)}}, {{&(0x7f0000000000)=@nfc={0x27}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000000)=[{0x18, 0x1, 0x1, "fc"}], 0x18}}], 0x2, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x800, 0x4b) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) accept4(r0, &(0x7f00000003c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000440)=0x80, 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'syz_tun\x00', 0x3000}) getsockname$ax25(r2, &(0x7f0000000480), &(0x7f00000004c0)=0x10) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000001c0)=@ax25, 0x80, &(0x7f0000000800)=[{&(0x7f0000000240)=""/138, 0x8a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/226, 0xe2}, {&(0x7f0000000300)=""/159, 0x9f}, {&(0x7f0000000600)=""/95, 0x5f}, {&(0x7f0000000680)=""/43, 0x2b}, {&(0x7f00000006c0)=""/83, 0x53}, {&(0x7f0000000740)=""/71, 0x47}, {&(0x7f00000007c0)=""/46, 0x2e}], 0x9, &(0x7f0000000880)=""/179, 0xb3, 0x8000}, 0x40000001) 2033/05/18 03:33:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x200e000, 0x1, &(0x7f0000000280)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_aout(r0, &(0x7f0000000680), 0x20) ftruncate(r0, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', '%eth1)vboxnet0eth1trusted#\x00'}, &(0x7f0000000100)='vfat\x00', 0x5, 0x0) 2033/05/18 03:33:41 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(tea)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="11f0ce816e3e86e498ffde8e889d90a0e2094b9bb7a41a392264b1bbde25b30bdb6b7b64921a26363de055d9cbbf12998ec04f0e29a9c1f44fa642ff9ba5e94936fc03ad9e0e3ad1f0cc82444e6498e25bfddbad6a3b22ccee2edda118d6f29223705bd0962e340e", 0x68}], 0x1, &(0x7f0000000000)}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x75}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2033/05/18 03:33:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x200e000, 0x1, &(0x7f0000000280)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_aout(r0, &(0x7f0000000680), 0x20) ftruncate(r0, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', '%eth1)vboxnet0eth1trusted#\x00'}, &(0x7f0000000100)='vfat\x00', 0x5, 0x0) 2033/05/18 03:33:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000180)=@migrate_id={0x16, 0x10, 0xfa00}, 0x18) 2033/05/18 03:33:41 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(tea)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="11f0ce816e3e86e498ffde8e889d90a0e2094b9bb7a41a392264b1bbde25b30bdb6b7b64921a26363de055d9cbbf12998ec04f0e29a9c1f44fa642ff9ba5e94936fc03ad9e0e3ad1f0cc82444e6498e25bfddbad6a3b22ccee2edda118d6f29223705bd0962e340e", 0x68}], 0x1, &(0x7f0000000000)}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x75}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2033/05/18 03:33:41 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:41 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(tea)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="11f0ce816e3e86e498ffde8e889d90a0e2094b9bb7a41a392264b1bbde25b30bdb6b7b64921a26363de055d9cbbf12998ec04f0e29a9c1f44fa642ff9ba5e94936fc03ad9e0e3ad1f0cc82444e6498e25bfddbad6a3b22ccee2edda118d6f29223705bd0962e340e", 0x68}], 0x1, &(0x7f0000000000)}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x75}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2033/05/18 03:33:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000180)=@migrate_id={0x16, 0x10, 0xfa00}, 0x18) 2033/05/18 03:33:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(tea)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="11f0ce816e3e86e498ffde8e889d90a0e2094b9bb7a41a392264b1bbde25b30bdb6b7b64921a26363de055d9cbbf12998ec04f0e29a9c1f44fa642ff9ba5e94936fc03ad9e0e3ad1f0cc82444e6498e25bfddbad6a3b22ccee2edda118d6f29223705bd0962e340e", 0x68}], 0x1, &(0x7f0000000000)}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x75}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) [ 126.651474] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 126.659430] FAT-fs (loop1): Filesystem has been set read-only 2033/05/18 03:33:41 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(tea)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="11f0ce816e3e86e498ffde8e889d90a0e2094b9bb7a41a392264b1bbde25b30bdb6b7b64921a26363de055d9cbbf12998ec04f0e29a9c1f44fa642ff9ba5e94936fc03ad9e0e3ad1f0cc82444e6498e25bfddbad6a3b22ccee2edda118d6f29223705bd0962e340e", 0x68}], 0x1, &(0x7f0000000000)}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x75}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2033/05/18 03:33:41 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x200e000, 0x1, &(0x7f0000000280)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_aout(r0, &(0x7f0000000680), 0x20) ftruncate(r0, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', '%eth1)vboxnet0eth1trusted#\x00'}, &(0x7f0000000100)='vfat\x00', 0x5, 0x0) [ 126.715448] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 126.723442] FAT-fs (loop2): Filesystem has been set read-only 2033/05/18 03:33:41 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x200e000, 0x1, &(0x7f0000000280)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_aout(r0, &(0x7f0000000680), 0x20) ftruncate(r0, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', '%eth1)vboxnet0eth1trusted#\x00'}, &(0x7f0000000100)='vfat\x00', 0x5, 0x0) 2033/05/18 03:33:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:41 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x108011, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000000c0)=0xe8) gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) setpriority(0xfffffffffffffffe, r1, 0x2) ptrace$getregset(0x4204, r1, 0x1, &(0x7f00000002c0)={&(0x7f0000000380)=""/229, 0xe5}) 2033/05/18 03:33:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000180)=@migrate_id={0x16, 0x10, 0xfa00}, 0x18) 2033/05/18 03:33:41 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:41 executing program 7: futex(&(0x7f0000000100), 0xc, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100), 0x0) [ 126.920956] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 126.928872] FAT-fs (loop1): Filesystem has been set read-only 2033/05/18 03:33:41 executing program 7: futex(&(0x7f0000000100), 0xc, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100), 0x0) 2033/05/18 03:33:41 executing program 5: socket$unix(0x1, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000700)='/dev/vcsa#\x00', 0x0, 0x1) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) 2033/05/18 03:33:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x40000000000a35) read(r0, &(0x7f00003fefff)=""/1, 0x1) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) 2033/05/18 03:33:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:41 executing program 6: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007f5300fe01b2a4a280930a06000000a8430891000000390008000a000c00cb0000001900a30700000000000000dc1338b3c9985befd54400009b84136ef75afb83de448daa7227c43ab8220000060c", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) socketpair(0x1a, 0x0, 0x7fff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) openat$cgroup_ro(r1, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$void(r1, 0xc0045878) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f00000002c0)={0x5, 0x3ff, 0x7, 0x0, 0xf}) accept4$vsock_stream(r2, &(0x7f0000000280)={0x28, 0x0, 0xffffffff, @host=0x2}, 0x10, 0x80000) fstatfs(r0, &(0x7f00000000c0)=""/140) 2033/05/18 03:33:41 executing program 3: syz_read_part_table(0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000297a975b2000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) [ 127.096963] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 127.104886] FAT-fs (loop2): Filesystem has been set read-only [ 127.186290] loop3: p1 p2 p3 p4 < > 2033/05/18 03:33:42 executing program 7: futex(&(0x7f0000000100), 0xc, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100), 0x0) 2033/05/18 03:33:42 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x108011, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000000c0)=0xe8) gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) setpriority(0xfffffffffffffffe, r1, 0x2) ptrace$getregset(0x4204, r1, 0x1, &(0x7f00000002c0)={&(0x7f0000000380)=""/229, 0xe5}) 2033/05/18 03:33:42 executing program 5: socket$unix(0x1, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000700)='/dev/vcsa#\x00', 0x0, 0x1) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) 2033/05/18 03:33:42 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x108011, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000000c0)=0xe8) gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) setpriority(0xfffffffffffffffe, r1, 0x2) ptrace$getregset(0x4204, r1, 0x1, &(0x7f00000002c0)={&(0x7f0000000380)=""/229, 0xe5}) 2033/05/18 03:33:42 executing program 6: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007f5300fe01b2a4a280930a06000000a8430891000000390008000a000c00cb0000001900a30700000000000000dc1338b3c9985befd54400009b84136ef75afb83de448daa7227c43ab8220000060c", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) socketpair(0x1a, 0x0, 0x7fff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) openat$cgroup_ro(r1, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$void(r1, 0xc0045878) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f00000002c0)={0x5, 0x3ff, 0x7, 0x0, 0xf}) accept4$vsock_stream(r2, &(0x7f0000000280)={0x28, 0x0, 0xffffffff, @host=0x2}, 0x10, 0x80000) fstatfs(r0, &(0x7f00000000c0)=""/140) 2033/05/18 03:33:42 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') r1 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r3 = syz_open_procfs(r1, &(0x7f0000000240)='fdinfo\x00') sched_setattr(r1, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x0, 0x0, 0xd7c7}, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000500)={0xdb3, 0x8, 0x80f503}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r6, 0x400) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49008bf1", 0x7, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r4, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) fsetxattr(r2, &(0x7f0000000100)=@random={'security.', 'fdinfo\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x1) 2033/05/18 03:33:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x40000000000a35) read(r0, &(0x7f00003fefff)=""/1, 0x1) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) 2033/05/18 03:33:42 executing program 3: syz_read_part_table(0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000297a975b2000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) [ 128.267098] loop3: p1 p2 p3 p4 < > 2033/05/18 03:33:43 executing program 6: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007f5300fe01b2a4a280930a06000000a8430891000000390008000a000c00cb0000001900a30700000000000000dc1338b3c9985befd54400009b84136ef75afb83de448daa7227c43ab8220000060c", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) socketpair(0x1a, 0x0, 0x7fff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) openat$cgroup_ro(r1, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$void(r1, 0xc0045878) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f00000002c0)={0x5, 0x3ff, 0x7, 0x0, 0xf}) accept4$vsock_stream(r2, &(0x7f0000000280)={0x28, 0x0, 0xffffffff, @host=0x2}, 0x10, 0x80000) fstatfs(r0, &(0x7f00000000c0)=""/140) 2033/05/18 03:33:43 executing program 7: futex(&(0x7f0000000100), 0xc, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100), 0x0) 2033/05/18 03:33:43 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x108011, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000000c0)=0xe8) gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) setpriority(0xfffffffffffffffe, r1, 0x2) ptrace$getregset(0x4204, r1, 0x1, &(0x7f00000002c0)={&(0x7f0000000380)=""/229, 0xe5}) 2033/05/18 03:33:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x40000000000a35) read(r0, &(0x7f00003fefff)=""/1, 0x1) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) 2033/05/18 03:33:43 executing program 5: socket$unix(0x1, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000700)='/dev/vcsa#\x00', 0x0, 0x1) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) 2033/05/18 03:33:43 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x108011, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000000c0)=0xe8) gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) setpriority(0xfffffffffffffffe, r1, 0x2) ptrace$getregset(0x4204, r1, 0x1, &(0x7f00000002c0)={&(0x7f0000000380)=""/229, 0xe5}) 2033/05/18 03:33:43 executing program 3: syz_read_part_table(0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000297a975b2000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) [ 128.458043] loop3: p1 p2 p3 p4 < > [ 128.508581] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 128.555907] print_req_error: I/O error, dev loop3, sector 301 [ 128.562274] print_req_error: I/O error, dev loop3, sector 1 [ 128.562359] print_req_error: I/O error, dev loop3, sector 101 [ 128.570909] print_req_error: I/O error, dev loop3, sector 1 [ 128.574429] print_req_error: I/O error, dev loop3, sector 201 [ 128.580187] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 128.599796] print_req_error: I/O error, dev loop3, sector 5 [ 128.605638] Buffer I/O error on dev loop3p1, logical block 1, async page read [ 128.613132] print_req_error: I/O error, dev loop3, sector 201 [ 128.619060] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 128.626417] print_req_error: I/O error, dev loop3, sector 205 [ 128.632345] Buffer I/O error on dev loop3p3, logical block 1, async page read [ 128.640271] print_req_error: I/O error, dev loop3, sector 101 [ 128.646205] Buffer I/O error on dev loop3p2, logical block 0, async page read [ 128.653551] print_req_error: I/O error, dev loop3, sector 105 [ 128.659475] Buffer I/O error on dev loop3p2, logical block 1, async page read [ 128.666825] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 128.674154] Buffer I/O error on dev loop3p3, logical block 1, async page read [ 128.681499] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 128.688833] Buffer I/O error on dev loop3p1, logical block 0, async page read 2033/05/18 03:33:44 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x108011, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000000c0)=0xe8) gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) setpriority(0xfffffffffffffffe, r1, 0x2) ptrace$getregset(0x4204, r1, 0x1, &(0x7f00000002c0)={&(0x7f0000000380)=""/229, 0xe5}) 2033/05/18 03:33:44 executing program 6: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007f5300fe01b2a4a280930a06000000a8430891000000390008000a000c00cb0000001900a30700000000000000dc1338b3c9985befd54400009b84136ef75afb83de448daa7227c43ab8220000060c", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) socketpair(0x1a, 0x0, 0x7fff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) openat$cgroup_ro(r1, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$void(r1, 0xc0045878) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f00000002c0)={0x5, 0x3ff, 0x7, 0x0, 0xf}) accept4$vsock_stream(r2, &(0x7f0000000280)={0x28, 0x0, 0xffffffff, @host=0x2}, 0x10, 0x80000) fstatfs(r0, &(0x7f00000000c0)=""/140) 2033/05/18 03:33:44 executing program 7: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000480)={[{@nocompress='nocompress', 0x2c}]}) 2033/05/18 03:33:44 executing program 5: socket$unix(0x1, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000700)='/dev/vcsa#\x00', 0x0, 0x1) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) 2033/05/18 03:33:44 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x108011, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000000c0)=0xe8) gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) setpriority(0xfffffffffffffffe, r1, 0x2) ptrace$getregset(0x4204, r1, 0x1, &(0x7f00000002c0)={&(0x7f0000000380)=""/229, 0xe5}) 2033/05/18 03:33:44 executing program 3: syz_read_part_table(0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000297a975b2000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 2033/05/18 03:33:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x40000000000a35) read(r0, &(0x7f00003fefff)=""/1, 0x1) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) 2033/05/18 03:33:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x40000000000a35) read(r0, &(0x7f00003fefff)=""/1, 0x1) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) 2033/05/18 03:33:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}]}, 0x28}, 0x1}, 0x0) [ 129.404762] loop3: p1 p2 p3 p4 < > 2033/05/18 03:33:44 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2033/05/18 03:33:44 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000968ff0)='/dev/sequencer2\x00', 0x801, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x80045105) 2033/05/18 03:33:44 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000a000)={0x8, 0x0, &(0x7f00001e4ff8)=[@acquire={0x40046305}], 0x118, 0x0, &(0x7f0000000100)}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x48, 0x0, &(0x7f0000000000)=[@dead_binder_done={0x40086310}, @decrefs={0x40046307}, @acquire_done={0x40106309}, @request_death={0x400c630e, 0x4}, @clear_death={0x400c630f, 0x0, 0x3}], 0x0, 0x0, &(0x7f000023c000)}) munmap(&(0x7f0000001000/0x2000)=nil, 0x2000) [ 129.459306] ISOFS: Unable to identify CD-ROM format. 2033/05/18 03:33:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000240)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000c26000)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x800000020000000, &(0x7f0000000080)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff}, 0x14) sendto$inet(r0, &(0x7f0000000180)="ae", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) [ 129.579678] ISOFS: Unable to identify CD-ROM format. 2033/05/18 03:33:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}]}, 0x28}, 0x1}, 0x0) 2033/05/18 03:33:44 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2033/05/18 03:33:44 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000968ff0)='/dev/sequencer2\x00', 0x801, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x80045105) 2033/05/18 03:33:44 executing program 7: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000480)={[{@nocompress='nocompress', 0x2c}]}) 2033/05/18 03:33:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000240)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000c26000)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x800000020000000, &(0x7f0000000080)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff}, 0x14) sendto$inet(r0, &(0x7f0000000180)="ae", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2033/05/18 03:33:44 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000968ff0)='/dev/sequencer2\x00', 0x801, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x80045105) 2033/05/18 03:33:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}]}, 0x28}, 0x1}, 0x0) 2033/05/18 03:33:44 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2033/05/18 03:33:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000240)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000c26000)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x800000020000000, &(0x7f0000000080)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff}, 0x14) sendto$inet(r0, &(0x7f0000000180)="ae", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) [ 129.867225] ISOFS: Unable to identify CD-ROM format. 2033/05/18 03:33:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x40000000000a35) read(r0, &(0x7f00003fefff)=""/1, 0x1) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) 2033/05/18 03:33:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x40000000000a35) read(r0, &(0x7f00003fefff)=""/1, 0x1) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) 2033/05/18 03:33:45 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000968ff0)='/dev/sequencer2\x00', 0x801, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x80045105) 2033/05/18 03:33:45 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}]}, 0x28}, 0x1}, 0x0) 2033/05/18 03:33:45 executing program 7: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000480)={[{@nocompress='nocompress', 0x2c}]}) [ 130.357195] ISOFS: Unable to identify CD-ROM format. [ 130.366652] binder: 9908:9972 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 130.373966] binder: 9908 invalid dec weak, ref 12 desc 0 s 1 w 0 [ 130.380378] binder: 9908:9972 BC_ACQUIRE_DONE node 11 has no pending acquire request [ 130.388837] binder: 9908:9972 BC_REQUEST_DEATH_NOTIFICATION invalid ref 4 [ 130.395884] binder: 9908:9972 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 130.522667] binder: BINDER_SET_CONTEXT_MGR already set [ 130.528386] binder: 9908:9972 ioctl 40046207 0 returned -16 [ 130.537721] binder: 9908:9977 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 130.545499] binder: 9908 invalid dec weak, ref 13 desc 0 s 1 w 0 [ 130.552280] binder: 9908:9977 BC_ACQUIRE_DONE u0000000000000000 no match [ 130.559339] binder: 9908:9977 BC_REQUEST_DEATH_NOTIFICATION invalid ref 4 [ 130.566337] binder: 9908:9977 BC_CLEAR_DEATH_NOTIFICATION death notification not active 2033/05/18 03:33:45 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000a000)={0x8, 0x0, &(0x7f00001e4ff8)=[@acquire={0x40046305}], 0x118, 0x0, &(0x7f0000000100)}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x48, 0x0, &(0x7f0000000000)=[@dead_binder_done={0x40086310}, @decrefs={0x40046307}, @acquire_done={0x40106309}, @request_death={0x400c630e, 0x4}, @clear_death={0x400c630f, 0x0, 0x3}], 0x0, 0x0, &(0x7f000023c000)}) munmap(&(0x7f0000001000/0x2000)=nil, 0x2000) 2033/05/18 03:33:45 executing program 7: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000480)={[{@nocompress='nocompress', 0x2c}]}) 2033/05/18 03:33:45 executing program 4: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00004f3000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f000058b000/0x2000)=nil) 2033/05/18 03:33:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000240)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000c26000)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x800000020000000, &(0x7f0000000080)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff}, 0x14) sendto$inet(r0, &(0x7f0000000180)="ae", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2033/05/18 03:33:45 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2033/05/18 03:33:45 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000968ff0)='/dev/sequencer2\x00', 0x801, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x80045105) 2033/05/18 03:33:45 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2033/05/18 03:33:45 executing program 0: mkdir(&(0x7f000000e000)='./control\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./control\x00', 0xc0b5, 0x0) faccessat(r0, &(0x7f000003fff6)='./control\x00', 0x0, 0x0) 2033/05/18 03:33:46 executing program 4: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00004f3000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f000058b000/0x2000)=nil) 2033/05/18 03:33:46 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000029c0)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000002980)={&(0x7f0000000440)={0x14, 0x2, 0x2, 0x301}, 0x14}, 0x1}, 0x0) 2033/05/18 03:33:46 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000968ff0)='/dev/sequencer2\x00', 0x801, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x80045105) [ 131.368991] ISOFS: Unable to identify CD-ROM format. 2033/05/18 03:33:46 executing program 6: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x5, 0x4, 0x3}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2033/05/18 03:33:46 executing program 0: r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x1fffd, 0x0) fallocate(r0, 0x0, 0xa3cf, 0x40) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x8, 0x0, 0x8000) 2033/05/18 03:33:46 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2033/05/18 03:33:46 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000968ff0)='/dev/sequencer2\x00', 0x801, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x80045105) 2033/05/18 03:33:46 executing program 4: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00004f3000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f000058b000/0x2000)=nil) [ 132.104894] binder: 9994:10042 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 132.112261] binder: 9994 invalid dec weak, ref 15 desc 0 s 1 w 0 [ 132.118472] binder: 9994:10042 BC_ACQUIRE_DONE node 14 has no pending acquire request [ 132.126503] binder: 9994:10042 BC_REQUEST_DEATH_NOTIFICATION invalid ref 4 [ 132.133581] binder: 9994:10042 BC_CLEAR_DEATH_NOTIFICATION death notification not active 2033/05/18 03:33:46 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000a000)={0x8, 0x0, &(0x7f00001e4ff8)=[@acquire={0x40046305}], 0x118, 0x0, &(0x7f0000000100)}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x48, 0x0, &(0x7f0000000000)=[@dead_binder_done={0x40086310}, @decrefs={0x40046307}, @acquire_done={0x40106309}, @request_death={0x400c630e, 0x4}, @clear_death={0x400c630f, 0x0, 0x3}], 0x0, 0x0, &(0x7f000023c000)}) munmap(&(0x7f0000001000/0x2000)=nil, 0x2000) 2033/05/18 03:33:46 executing program 7: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1f, 0x4000) acct(&(0x7f0000000040)='./file0\x00') add_key(&(0x7f0000000280)='cifs.idmap\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, &(0x7f0000000300), 0x0, 0xfffffffffffffffe) 2033/05/18 03:33:46 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000029c0)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000002980)={&(0x7f0000000440)={0x14, 0x2, 0x2, 0x301}, 0x14}, 0x1}, 0x0) 2033/05/18 03:33:46 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000a31fb9)={0x0, 0x0, 0x0, "7175657565300000000000000000000000000000e5ffffffffffffff000000000000000000000000000000800000fffb00"}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f000013e000)={0x0, 0x0, {0x0, 0x1}}) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2033/05/18 03:33:46 executing program 4: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00004f3000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f000058b000/0x2000)=nil) 2033/05/18 03:33:46 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2033/05/18 03:33:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f0000001900)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_VFINFO_LIST={0x18, 0x16, [{0x14, 0x1, [@typed={0x10, 0xb, @binary="307df88465159dc9c7"}]}]}]}, 0x38}, 0x1}, 0x0) 2033/05/18 03:33:46 executing program 6: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x5, 0x4, 0x3}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2033/05/18 03:33:47 executing program 4: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x5, 0x4, 0x3}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2033/05/18 03:33:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f0000001900)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_VFINFO_LIST={0x18, 0x16, [{0x14, 0x1, [@typed={0x10, 0xb, @binary="307df88465159dc9c7"}]}]}]}, 0x38}, 0x1}, 0x0) 2033/05/18 03:33:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') sendfile(r0, r1, &(0x7f0000000180)=0x2e, 0x1000) 2033/05/18 03:33:47 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000029c0)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000002980)={&(0x7f0000000440)={0x14, 0x2, 0x2, 0x301}, 0x14}, 0x1}, 0x0) 2033/05/18 03:33:47 executing program 6: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x5, 0x4, 0x3}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2033/05/18 03:33:47 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000a31fb9)={0x0, 0x0, 0x0, "7175657565300000000000000000000000000000e5ffffffffffffff000000000000000000000000000000800000fffb00"}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f000013e000)={0x0, 0x0, {0x0, 0x1}}) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2033/05/18 03:33:47 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000a31fb9)={0x0, 0x0, 0x0, "7175657565300000000000000000000000000000e5ffffffffffffff000000000000000000000000000000800000fffb00"}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f000013e000)={0x0, 0x0, {0x0, 0x1}}) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2033/05/18 03:33:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') sendfile(r0, r1, &(0x7f0000000180)=0x2e, 0x1000) [ 133.115488] binder: 10061:10101 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 133.122988] binder: 10061 invalid dec weak, ref 17 desc 0 s 1 w 0 [ 133.129284] binder: 10061:10101 BC_ACQUIRE_DONE node 16 has no pending acquire request [ 133.137393] binder: 10061:10101 BC_REQUEST_DEATH_NOTIFICATION invalid ref 4 [ 133.144556] binder: 10061:10101 BC_CLEAR_DEATH_NOTIFICATION death notification not active 2033/05/18 03:33:47 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000a000)={0x8, 0x0, &(0x7f00001e4ff8)=[@acquire={0x40046305}], 0x118, 0x0, &(0x7f0000000100)}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x48, 0x0, &(0x7f0000000000)=[@dead_binder_done={0x40086310}, @decrefs={0x40046307}, @acquire_done={0x40106309}, @request_death={0x400c630e, 0x4}, @clear_death={0x400c630f, 0x0, 0x3}], 0x0, 0x0, &(0x7f000023c000)}) munmap(&(0x7f0000001000/0x2000)=nil, 0x2000) 2033/05/18 03:33:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f0000001900)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_VFINFO_LIST={0x18, 0x16, [{0x14, 0x1, [@typed={0x10, 0xb, @binary="307df88465159dc9c7"}]}]}]}, 0x38}, 0x1}, 0x0) 2033/05/18 03:33:47 executing program 4: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x5, 0x4, 0x3}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2033/05/18 03:33:47 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000a31fb9)={0x0, 0x0, 0x0, "7175657565300000000000000000000000000000e5ffffffffffffff000000000000000000000000000000800000fffb00"}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f000013e000)={0x0, 0x0, {0x0, 0x1}}) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2033/05/18 03:33:47 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000029c0)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000002980)={&(0x7f0000000440)={0x14, 0x2, 0x2, 0x301}, 0x14}, 0x1}, 0x0) 2033/05/18 03:33:47 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000a31fb9)={0x0, 0x0, 0x0, "7175657565300000000000000000000000000000e5ffffffffffffff000000000000000000000000000000800000fffb00"}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f000013e000)={0x0, 0x0, {0x0, 0x1}}) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2033/05/18 03:33:47 executing program 6: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x5, 0x4, 0x3}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2033/05/18 03:33:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') sendfile(r0, r1, &(0x7f0000000180)=0x2e, 0x1000) 2033/05/18 03:33:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') sendfile(r0, r1, &(0x7f0000000180)=0x2e, 0x1000) 2033/05/18 03:33:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f0000001900)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_VFINFO_LIST={0x18, 0x16, [{0x14, 0x1, [@typed={0x10, 0xb, @binary="307df88465159dc9c7"}]}]}]}, 0x38}, 0x1}, 0x0) 2033/05/18 03:33:48 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000a31fb9)={0x0, 0x0, 0x0, "7175657565300000000000000000000000000000e5ffffffffffffff000000000000000000000000000000800000fffb00"}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f000013e000)={0x0, 0x0, {0x0, 0x1}}) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2033/05/18 03:33:48 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000a31fb9)={0x0, 0x0, 0x0, "7175657565300000000000000000000000000000e5ffffffffffffff000000000000000000000000000000800000fffb00"}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f000013e000)={0x0, 0x0, {0x0, 0x1}}) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2033/05/18 03:33:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000ff8ffc)=0x8005, 0x115168ef5b0da2d5) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='lo\x00', 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2033/05/18 03:33:48 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup2(r0, r0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040)={0x7ff}, 0x2) 2033/05/18 03:33:48 executing program 4: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x5, 0x4, 0x3}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2033/05/18 03:33:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) getdents(r0, &(0x7f0000000280)=""/50, 0x1d7) [ 133.625679] FAT-fs (loop5): error, invalid access to FAT (entry 0x000006c0) [ 133.633094] FAT-fs (loop5): Filesystem has been set read-only [ 133.685267] FAT-fs (loop5): error, invalid access to FAT (entry 0x000006c0) [ 134.133961] binder: 10120:10161 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 134.141420] binder: 10120 invalid dec weak, ref 19 desc 0 s 1 w 0 [ 134.147701] binder: 10120:10161 BC_ACQUIRE_DONE node 18 has no pending acquire request [ 134.155802] binder: 10120:10161 BC_REQUEST_DEATH_NOTIFICATION invalid ref 4 [ 134.163406] binder: 10120:10161 BC_CLEAR_DEATH_NOTIFICATION death notification not active 2033/05/18 03:33:48 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a) write(r0, &(0x7f0000000580)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58) write(r0, &(0x7f0000000600)="1e49c8180136312874c1c0f1d4a1c31d6b00f02fd45473825d222e7de065e471c3f63a912079e20cf8495df167c5", 0x2e) ioctl$sock_inet_SIOCSARP(r0, 0x2286, &(0x7f000035bfbc)={{0x2, 0x0, @rand_addr}, {}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}) 2033/05/18 03:33:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f00000034c0)='./file0\x00', &(0x7f0000003500)="2e2f30e530653000", 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) 2033/05/18 03:33:48 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(xtea-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000002cc0)="6dab9a94cb4e701c787800ac7a4ca7e90e2f27", 0x13}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000740)={&(0x7f0000000180)=@pppoe={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/18, 0x12}, {&(0x7f0000000540)=""/42, 0x2a}], 0x2, &(0x7f0000000640)=""/231, 0xe7}, 0x0) 2033/05/18 03:33:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000ff8ffc)=0x8005, 0x115168ef5b0da2d5) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='lo\x00', 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2033/05/18 03:33:48 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup2(r0, r0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040)={0x7ff}, 0x2) 2033/05/18 03:33:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) getdents(r0, &(0x7f0000000280)=""/50, 0x1d7) 2033/05/18 03:33:48 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) 2033/05/18 03:33:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) fcntl$setstatus(r1, 0x4, 0x2800) 2033/05/18 03:33:49 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) [ 134.337084] FAT-fs (loop5): error, invalid access to FAT (entry 0x000006c0) [ 134.344325] FAT-fs (loop5): Filesystem has been set read-only 2033/05/18 03:33:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) getdents(r0, &(0x7f0000000280)=""/50, 0x1d7) 2033/05/18 03:33:49 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a) write(r0, &(0x7f0000000580)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58) write(r0, &(0x7f0000000600)="1e49c8180136312874c1c0f1d4a1c31d6b00f02fd45473825d222e7de065e471c3f63a912079e20cf8495df167c5", 0x2e) ioctl$sock_inet_SIOCSARP(r0, 0x2286, &(0x7f000035bfbc)={{0x2, 0x0, @rand_addr}, {}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}) 2033/05/18 03:33:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) fcntl$setstatus(r1, 0x4, 0x2800) 2033/05/18 03:33:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f00000034c0)='./file0\x00', &(0x7f0000003500)="2e2f30e530653000", 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) 2033/05/18 03:33:49 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) 2033/05/18 03:33:49 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup2(r0, r0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040)={0x7ff}, 0x2) 2033/05/18 03:33:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000ff8ffc)=0x8005, 0x115168ef5b0da2d5) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='lo\x00', 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2033/05/18 03:33:49 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(xtea-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000002cc0)="6dab9a94cb4e701c787800ac7a4ca7e90e2f27", 0x13}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000740)={&(0x7f0000000180)=@pppoe={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/18, 0x12}, {&(0x7f0000000540)=""/42, 0x2a}], 0x2, &(0x7f0000000640)=""/231, 0xe7}, 0x0) 2033/05/18 03:33:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f00000034c0)='./file0\x00', &(0x7f0000003500)="2e2f30e530653000", 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) 2033/05/18 03:33:49 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup2(r0, r0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040)={0x7ff}, 0x2) 2033/05/18 03:33:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) fcntl$setstatus(r1, 0x4, 0x2800) 2033/05/18 03:33:49 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a) write(r0, &(0x7f0000000580)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58) write(r0, &(0x7f0000000600)="1e49c8180136312874c1c0f1d4a1c31d6b00f02fd45473825d222e7de065e471c3f63a912079e20cf8495df167c5", 0x2e) ioctl$sock_inet_SIOCSARP(r0, 0x2286, &(0x7f000035bfbc)={{0x2, 0x0, @rand_addr}, {}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}) 2033/05/18 03:33:49 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) [ 134.635256] FAT-fs (loop5): error, invalid access to FAT (entry 0x000006c0) [ 134.642456] FAT-fs (loop5): Filesystem has been set read-only 2033/05/18 03:33:49 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(xtea-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000002cc0)="6dab9a94cb4e701c787800ac7a4ca7e90e2f27", 0x13}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000740)={&(0x7f0000000180)=@pppoe={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/18, 0x12}, {&(0x7f0000000540)=""/42, 0x2a}], 0x2, &(0x7f0000000640)=""/231, 0xe7}, 0x0) 2033/05/18 03:33:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000ff8ffc)=0x8005, 0x115168ef5b0da2d5) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='lo\x00', 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2033/05/18 03:33:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f00000034c0)='./file0\x00', &(0x7f0000003500)="2e2f30e530653000", 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) 2033/05/18 03:33:49 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000d51eed)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @broadcast=0xffffffff}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x8, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}}}}}}, 0x0) 2033/05/18 03:33:49 executing program 4: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3d, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "802a08000000006b"}}}}}}}, 0x0) 2033/05/18 03:33:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) fcntl$setstatus(r1, 0x4, 0x2800) 2033/05/18 03:33:49 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a) write(r0, &(0x7f0000000580)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58) write(r0, &(0x7f0000000600)="1e49c8180136312874c1c0f1d4a1c31d6b00f02fd45473825d222e7de065e471c3f63a912079e20cf8495df167c5", 0x2e) ioctl$sock_inet_SIOCSARP(r0, 0x2286, &(0x7f000035bfbc)={{0x2, 0x0, @rand_addr}, {}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}) 2033/05/18 03:33:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) getdents(r0, &(0x7f0000000280)=""/50, 0x1d7) 2033/05/18 03:33:49 executing program 4: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3d, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "802a08000000006b"}}}}}}}, 0x0) 2033/05/18 03:33:49 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x8000}, 0x10) 2033/05/18 03:33:49 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000051d000)='ns/user\x00') ioctl$VT_RELDISP(r0, 0xb702) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) 2033/05/18 03:33:49 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(xtea-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000002cc0)="6dab9a94cb4e701c787800ac7a4ca7e90e2f27", 0x13}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000740)={&(0x7f0000000180)=@pppoe={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/18, 0x12}, {&(0x7f0000000540)=""/42, 0x2a}], 0x2, &(0x7f0000000640)=""/231, 0xe7}, 0x0) 2033/05/18 03:33:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000200)=""/123, 0x18) 2033/05/18 03:33:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x14, 0x2000000000000027, 0x331, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) perf_event_open(&(0x7f0000fdef88)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000002700)={&(0x7f0000000000)=@pppoe={0x0, 0x0, {0x0, @random}}, 0x80, &(0x7f0000001640), 0x0, &(0x7f0000001700)=""/4096, 0x1000}, 0x0) [ 134.939237] FAT-fs (loop5): error, invalid access to FAT (entry 0x000006c0) [ 134.946447] FAT-fs (loop5): Filesystem has been set read-only 2033/05/18 03:33:49 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x60000000) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000002b80)={&(0x7f0000000180)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFNAME={0x14, 0x3, "2f70365f76746930099300"}]}, 0x34}, 0x1}, 0x0) 2033/05/18 03:33:49 executing program 4: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3d, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "802a08000000006b"}}}}}}}, 0x0) [ 135.130905] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:33:49 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000051d000)='ns/user\x00') ioctl$VT_RELDISP(r0, 0xb702) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) 2033/05/18 03:33:49 executing program 4: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3d, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "802a08000000006b"}}}}}}}, 0x0) 2033/05/18 03:33:49 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x8000}, 0x10) 2033/05/18 03:33:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000f00)={"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"}) 2033/05/18 03:33:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) getdents(r0, &(0x7f00000000c0)=""/50, 0x32) 2033/05/18 03:33:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x14, 0x2000000000000027, 0x331, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) perf_event_open(&(0x7f0000fdef88)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000002700)={&(0x7f0000000000)=@pppoe={0x0, 0x0, {0x0, @random}}, 0x80, &(0x7f0000001640), 0x0, &(0x7f0000001700)=""/4096, 0x1000}, 0x0) 2033/05/18 03:33:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000200)=""/123, 0x18) 2033/05/18 03:33:49 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x60000000) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000002b80)={&(0x7f0000000180)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFNAME={0x14, 0x3, "2f70365f76746930099300"}]}, 0x34}, 0x1}, 0x0) [ 135.309806] FAT-fs (loop5): error, invalid access to FAT (entry 0x000006c0) [ 135.317080] FAT-fs (loop5): Filesystem has been set read-only 2033/05/18 03:33:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x8000}, 0x10) 2033/05/18 03:33:50 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000080)={0x0, r1+10000000}, &(0x7f0000000140)) r2 = memfd_create(&(0x7f0000000180)="70707031247573ff0100", 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x12, r2, 0x0) tkill(r0, 0x1000000000016) 2033/05/18 03:33:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x14, 0x2000000000000027, 0x331, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) perf_event_open(&(0x7f0000fdef88)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000002700)={&(0x7f0000000000)=@pppoe={0x0, 0x0, {0x0, @random}}, 0x80, &(0x7f0000001640), 0x0, &(0x7f0000001700)=""/4096, 0x1000}, 0x0) [ 135.380396] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:33:50 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000051d000)='ns/user\x00') ioctl$VT_RELDISP(r0, 0xb702) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) 2033/05/18 03:33:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000200)=""/123, 0x18) [ 135.422281] FAT-fs (loop5): error, invalid access to FAT (entry 0x000006c0) 2033/05/18 03:33:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x8000}, 0x10) 2033/05/18 03:33:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000f00)={"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"}) 2033/05/18 03:33:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) getdents(r0, &(0x7f00000000c0)=""/50, 0x32) [ 135.701195] FAT-fs (loop5): error, invalid access to FAT (entry 0x000006c0) [ 135.708491] FAT-fs (loop5): Filesystem has been set read-only 2033/05/18 03:33:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x14, 0x2000000000000027, 0x331, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) perf_event_open(&(0x7f0000fdef88)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000002700)={&(0x7f0000000000)=@pppoe={0x0, 0x0, {0x0, @random}}, 0x80, &(0x7f0000001640), 0x0, &(0x7f0000001700)=""/4096, 0x1000}, 0x0) 2033/05/18 03:33:51 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000051d000)='ns/user\x00') ioctl$VT_RELDISP(r0, 0xb702) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) 2033/05/18 03:33:51 executing program 2: unshare(0x60000000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000180)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 2033/05/18 03:33:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000200)=""/123, 0x18) 2033/05/18 03:33:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000f00)={"8a927799b01a030000001eda96dd379385fc78b28fcbf8eb8455a6fb67a8de46d4d4000500000000000000f414ac843703bcec54e832c980073c4cdc084a1966c440f15811d016f5b50e90810603f10aea61c14e267ceddd68987e4bb4b3c5199cadf58ab550c72ab9ca578f22072532229fbc9d9c4d1e045191112b0d584c8fd736ee3e7d73d5267b674281395000b90f0d692d30ecfb8063260400000024aa58b111193c5f100bb2e1f3874a807d63dfb58775215937ae2b62b46c6d5816f2fc52aea10000000000000003252929e628ad2c34a0ef717fb2504d9bd6ffffffffffffffff145c072f3087a5566d38fda729442c3ebd62df70a9a3eb242747993601a8a186b83705000000000000fd638feeae79436a9708b3bb19f38377382ea7b4c9c2d674b80ef220109f8fa8200de4794547b4da6430ac512116d358949a298812c5d54017aa2fc8b814ecf28c41d4c83474ba93a8ad32b16371b42350bf984abb465228cfd848014a1f383d21d0a3315f1b8599efa1bf10bd30a13717060000004a19db7c777b951c43ad44079d2755f8552563c7639ce00da8ee3ece9ded52625aa3f0a1d7b76b32536d39eeae158271064ea79bddf1032b6e6ac7940402000000000000cc7b631c6df64f28d75d99443d6653db3c6b7961190e8f82a233000001002ce4f40668ef93f01aef51c6569fa92100000006af34b21ed8437a371c0b427cd8c90000010000000000b5bff60a0c4f4793cd6638a2a23d68000000005599fbc1361b8ce27ba6ba1527cc59bc9c030104000000000000a51eef947915369bdd4fc3cded2676e47515838f8fbba284c5b4efc52510190bef59d117d34c7be50fbd1329d21ac7bca059b7d6bb11fc4a114a13542dee77b2651783f6a504d53500004000005105d1ddb56f1ac26584547d8d5cecb3c672068cc7ab31ddc5ae0a250000000000000007df49fa0100de0f7b3717528eb3b7e70733538a8eec8fb17616d2198d02ba4e7690fab7b33b676deddb27755d6a8f29c643dfff0e4bd7c2b13b7a57a3120cb2cbb70200339dc0842dafad481a63e7f90d14c54803d8b100e0ad5cae9a0a7b2f329c3b0000000000000002f4b2eebf5b43cdd155594d584366052b7df01c13c7cb674ff41cb3c7cb890300e86bda845164825e28b9fb719e695a9eb9710f924ae9671c96bebe4274594038347691a088f9bcaeba9011caac08fc24388cc15dffeda1bd610582c5b74fa6bfe789ce440f71872dde8b04000000000000050000005b9624684eeb21dbdb9afd74dd0067d82a72429fefe12a599494388cb56cdb5ef91b0980f9128e689e07e98b2ed59e1537fc7de144dc2030374bd153cfd8f2ef242803f7bcbc07145f65b891084a335b858dddac2f5200cb102ec89d0a5aac3dd089e0075506a1fd25799f1637b1bafaf09954ef"}) 2033/05/18 03:33:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) getdents(r0, &(0x7f00000000c0)=""/50, 0x32) 2033/05/18 03:33:51 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000080)={0x0, r1+10000000}, &(0x7f0000000140)) r2 = memfd_create(&(0x7f0000000180)="70707031247573ff0100", 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x12, r2, 0x0) tkill(r0, 0x1000000000016) 2033/05/18 03:33:51 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x60000000) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000002b80)={&(0x7f0000000180)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFNAME={0x14, 0x3, "2f70365f76746930099300"}]}, 0x34}, 0x1}, 0x0) [ 136.366206] IPVS: ftp: loaded support on port[0] = 21 [ 136.372949] IPVS: ftp: loaded support on port[0] = 21 [ 136.390271] FAT-fs (loop5): error, invalid access to FAT (entry 0x000006c0) [ 136.397494] FAT-fs (loop5): Filesystem has been set read-only 2033/05/18 03:33:51 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x7ffffffffffffffb, 0x8) 2033/05/18 03:33:51 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00006a6000)='/dev/cuse\x00', 0x0, 0x0) io_setup(0x203, &(0x7f0000d5aff8)=0x0) io_getevents(r2, 0x1, 0x1, &(0x7f0000c89f80)=[{}], &(0x7f0000000000)={0x77359400}) io_submit(r2, 0x1, &(0x7f000044b000)=[&(0x7f0000403fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000000c0)}]) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000040)=0x9, 0x4) fcntl$getflags(r0, 0xb) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40400, 0x0) getpid() 2033/05/18 03:33:51 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00005aeff6)='net/kcm\x00\b\x00') r1 = socket$kcm(0x29, 0x2, 0x0) sendfile(r1, r0, &(0x7f0000301ff8)=0x2, 0xff) 2033/05/18 03:33:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000f00)={"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"}) 2033/05/18 03:33:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) getdents(r0, &(0x7f00000000c0)=""/50, 0x32) 2033/05/18 03:33:51 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x7ffffffffffffffb, 0x8) 2033/05/18 03:33:51 executing program 2: unshare(0x60000000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000180)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 2033/05/18 03:33:51 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x400000002}, 0x1c) sendmmsg(r0, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)}}, {{&(0x7f0000000400)=@in6={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f0000003740), 0x1e6}}], 0x2, 0x0) [ 136.766190] FAT-fs (loop5): error, invalid access to FAT (entry 0x000006c0) [ 136.773424] FAT-fs (loop5): Filesystem has been set read-only [ 136.778562] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:33:52 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00005aeff6)='net/kcm\x00\b\x00') r1 = socket$kcm(0x29, 0x2, 0x0) sendfile(r1, r0, &(0x7f0000301ff8)=0x2, 0xff) 2033/05/18 03:33:52 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x7ffffffffffffffb, 0x8) 2033/05/18 03:33:52 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x400000002}, 0x1c) sendmmsg(r0, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)}}, {{&(0x7f0000000400)=@in6={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f0000003740), 0x1e6}}], 0x2, 0x0) 2033/05/18 03:33:52 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x60000000) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000002b80)={&(0x7f0000000180)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFNAME={0x14, 0x3, "2f70365f76746930099300"}]}, 0x34}, 0x1}, 0x0) 2033/05/18 03:33:52 executing program 2: unshare(0x60000000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000180)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 2033/05/18 03:33:52 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x5}, [@nested={0x8, 0x11, [@generic="04"]}]}, 0x1c}, 0x1}, 0x0) 2033/05/18 03:33:52 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00006a6000)='/dev/cuse\x00', 0x0, 0x0) io_setup(0x203, &(0x7f0000d5aff8)=0x0) io_getevents(r2, 0x1, 0x1, &(0x7f0000c89f80)=[{}], &(0x7f0000000000)={0x77359400}) io_submit(r2, 0x1, &(0x7f000044b000)=[&(0x7f0000403fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000000c0)}]) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000040)=0x9, 0x4) fcntl$getflags(r0, 0xb) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40400, 0x0) getpid() 2033/05/18 03:33:52 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000080)={0x0, r1+10000000}, &(0x7f0000000140)) r2 = memfd_create(&(0x7f0000000180)="70707031247573ff0100", 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x12, r2, 0x0) tkill(r0, 0x1000000000016) 2033/05/18 03:33:52 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x7ffffffffffffffb, 0x8) [ 137.951572] IPVS: ftp: loaded support on port[0] = 21 [ 137.964736] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:33:52 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x400000002}, 0x1c) sendmmsg(r0, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)}}, {{&(0x7f0000000400)=@in6={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f0000003740), 0x1e6}}], 0x2, 0x0) 2033/05/18 03:33:52 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x5}, [@nested={0x8, 0x11, [@generic="04"]}]}, 0x1c}, 0x1}, 0x0) 2033/05/18 03:33:52 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00005aeff6)='net/kcm\x00\b\x00') r1 = socket$kcm(0x29, 0x2, 0x0) sendfile(r1, r0, &(0x7f0000301ff8)=0x2, 0xff) 2033/05/18 03:33:52 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0x1276) 2033/05/18 03:33:52 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x400000002}, 0x1c) sendmmsg(r0, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)}}, {{&(0x7f0000000400)=@in6={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f0000003740), 0x1e6}}], 0x2, 0x0) 2033/05/18 03:33:53 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x5}, [@nested={0x8, 0x11, [@generic="04"]}]}, 0x1c}, 0x1}, 0x0) 2033/05/18 03:33:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00005aeff6)='net/kcm\x00\b\x00') r1 = socket$kcm(0x29, 0x2, 0x0) sendfile(r1, r0, &(0x7f0000301ff8)=0x2, 0xff) 2033/05/18 03:33:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x6, 0x35a, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000240)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000180)=""/49}, 0x18) 2033/05/18 03:33:53 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x35, &(0x7f0000fb6ffc)=0x1, 0x4) 2033/05/18 03:33:53 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0x1276) 2033/05/18 03:33:53 executing program 2: unshare(0x60000000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000180)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 2033/05/18 03:33:53 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00006a6000)='/dev/cuse\x00', 0x0, 0x0) io_setup(0x203, &(0x7f0000d5aff8)=0x0) io_getevents(r2, 0x1, 0x1, &(0x7f0000c89f80)=[{}], &(0x7f0000000000)={0x77359400}) io_submit(r2, 0x1, &(0x7f000044b000)=[&(0x7f0000403fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000000c0)}]) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000040)=0x9, 0x4) fcntl$getflags(r0, 0xb) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40400, 0x0) getpid() 2033/05/18 03:33:53 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000080)={0x0, r1+10000000}, &(0x7f0000000140)) r2 = memfd_create(&(0x7f0000000180)="70707031247573ff0100", 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x12, r2, 0x0) tkill(r0, 0x1000000000016) [ 138.825131] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:33:53 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x35, &(0x7f0000fb6ffc)=0x1, 0x4) 2033/05/18 03:33:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x3, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0xffffffffffffff4d) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x3a, 0x0, &(0x7f0000000080)) 2033/05/18 03:33:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x6, 0x35a, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000240)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000180)=""/49}, 0x18) 2033/05/18 03:33:53 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x5}, [@nested={0x8, 0x11, [@generic="04"]}]}, 0x1c}, 0x1}, 0x0) 2033/05/18 03:33:53 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x35, &(0x7f0000fb6ffc)=0x1, 0x4) 2033/05/18 03:33:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x6, 0x35a, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000240)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000180)=""/49}, 0x18) 2033/05/18 03:33:53 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0x1276) 2033/05/18 03:33:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x3, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0xffffffffffffff4d) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x3a, 0x0, &(0x7f0000000080)) 2033/05/18 03:33:54 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x35, &(0x7f0000fb6ffc)=0x1, 0x4) 2033/05/18 03:33:54 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00006a6000)='/dev/cuse\x00', 0x0, 0x0) io_setup(0x203, &(0x7f0000d5aff8)=0x0) io_getevents(r2, 0x1, 0x1, &(0x7f0000c89f80)=[{}], &(0x7f0000000000)={0x77359400}) io_submit(r2, 0x1, &(0x7f000044b000)=[&(0x7f0000403fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000000c0)}]) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000040)=0x9, 0x4) fcntl$getflags(r0, 0xb) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40400, 0x0) getpid() 2033/05/18 03:33:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x3, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0xffffffffffffff4d) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x3a, 0x0, &(0x7f0000000080)) 2033/05/18 03:33:54 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000000)) 2033/05/18 03:33:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x6, 0x35a, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000240)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000180)=""/49}, 0x18) 2033/05/18 03:33:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x3, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0xffffffffffffff4d) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x3a, 0x0, &(0x7f0000000080)) 2033/05/18 03:33:54 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0x1276) 2033/05/18 03:33:54 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[{0x18, 0x0, 0x7, "8605"}], 0x18}}], 0x2, 0x0) 2033/05/18 03:33:54 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_fuse_mount(&(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) dup2(r0, r1) 2033/05/18 03:33:54 executing program 7: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 2033/05/18 03:33:54 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000000)) 2033/05/18 03:33:54 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[{0x18, 0x0, 0x7, "8605"}], 0x18}}], 0x2, 0x0) 2033/05/18 03:33:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x3, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0xffffffffffffff4d) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x3a, 0x0, &(0x7f0000000080)) 2033/05/18 03:33:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x3, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0xffffffffffffff4d) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x3a, 0x0, &(0x7f0000000080)) 2033/05/18 03:33:54 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000000)) 2033/05/18 03:33:54 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r1, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000400)={0x0, 0x0}) prlimit64(r3, 0x0, 0x0, 0x0) 2033/05/18 03:33:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x3, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0xffffffffffffff4d) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x3a, 0x0, &(0x7f0000000080)) 2033/05/18 03:33:55 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r1, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000400)={0x0, 0x0}) prlimit64(r3, 0x0, 0x0, 0x0) 2033/05/18 03:33:55 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000100)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 2033/05/18 03:33:55 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000000)) 2033/05/18 03:33:55 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_fuse_mount(&(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) dup2(r0, r1) 2033/05/18 03:33:55 executing program 7: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 2033/05/18 03:33:55 executing program 1: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 2033/05/18 03:33:55 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[{0x18, 0x0, 0x7, "8605"}], 0x18}}], 0x2, 0x0) 2033/05/18 03:33:55 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000100)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 2033/05/18 03:33:55 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[{0x18, 0x0, 0x7, "8605"}], 0x18}}], 0x2, 0x0) 2033/05/18 03:33:55 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r1, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000400)={0x0, 0x0}) prlimit64(r3, 0x0, 0x0, 0x0) 2033/05/18 03:33:55 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_fuse_mount(&(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) dup2(r0, r1) 2033/05/18 03:33:55 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 2033/05/18 03:33:55 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000100)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 2033/05/18 03:33:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000200)="1f0000000104fffff13bdbc007110009f30501000b000240000000004f6644", 0x1f) 2033/05/18 03:33:56 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r1, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000400)={0x0, 0x0}) prlimit64(r3, 0x0, 0x0, 0x0) 2033/05/18 03:33:56 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_fuse_mount(&(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) dup2(r0, r1) 2033/05/18 03:33:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000100)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 2033/05/18 03:33:56 executing program 6: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'bond0\x00', &(0x7f0000000380)=@ethtool_rxnfc={0x0, 0x0, 0x0, {0x0, @ether_spec={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, {'\bu', @link_local={0x1, 0x80, 0xc2}}, @esp_ip6_spec={@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {'8\\', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 0x1}}}}) [ 141.376501] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 141.435821] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 2033/05/18 03:33:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000200)="1f0000000104fffff13bdbc007110009f30501000b000240000000004f6644", 0x1f) 2033/05/18 03:33:56 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) mknod(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) acct(&(0x7f0000000380)='./file0/file0\x00') chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f00000075c0)='./file0\x00', 0x0) [ 141.579307] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 141.593650] Process accounting resumed [ 141.617983] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:33:56 executing program 7: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 2033/05/18 03:33:56 executing program 1: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 2033/05/18 03:33:56 executing program 6: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'bond0\x00', &(0x7f0000000380)=@ethtool_rxnfc={0x0, 0x0, 0x0, {0x0, @ether_spec={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, {'\bu', @link_local={0x1, 0x80, 0xc2}}, @esp_ip6_spec={@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {'8\\', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 0x1}}}}) 2033/05/18 03:33:56 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) mknod(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) acct(&(0x7f0000000380)='./file0/file0\x00') chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2033/05/18 03:33:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000200)="1f0000000104fffff13bdbc007110009f30501000b000240000000004f6644", 0x1f) 2033/05/18 03:33:56 executing program 6: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'bond0\x00', &(0x7f0000000380)=@ethtool_rxnfc={0x0, 0x0, 0x0, {0x0, @ether_spec={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, {'\bu', @link_local={0x1, 0x80, 0xc2}}, @esp_ip6_spec={@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {'8\\', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 0x1}}}}) [ 141.966758] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 141.982301] Process accounting resumed 2033/05/18 03:33:56 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_fuse_mount(&(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) dup2(r0, r1) [ 142.518750] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.525203] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.532449] device bridge_slave_0 entered promiscuous mode [ 142.569274] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.575667] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.582868] device bridge_slave_1 entered promiscuous mode [ 142.619255] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 142.654483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 142.662880] device bridge_slave_1 left promiscuous mode [ 142.669241] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.688827] device bridge_slave_0 left promiscuous mode [ 142.694364] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.717041] device bridge_slave_1 left promiscuous mode [ 142.722533] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.739816] device bridge_slave_0 left promiscuous mode [ 142.745355] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.816858] team0 (unregistering): Port device team_slave_1 removed [ 142.827640] team0 (unregistering): Port device team_slave_0 removed [ 142.839190] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 142.854875] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 142.889338] bond0 (unregistering): Released all slaves [ 142.909490] team0 (unregistering): Port device team_slave_1 removed [ 142.919134] team0 (unregistering): Port device team_slave_0 removed [ 142.928593] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 142.947225] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 142.973515] bond0 (unregistering): Released all slaves [ 143.039668] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 143.067467] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 143.237559] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.244970] team0: Port device team_slave_0 added [ 143.281545] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.288933] team0: Port device team_slave_1 added [ 143.325635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.364711] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.404080] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 143.411290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.426718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.459350] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 143.466515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.482080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.852313] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.858724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.865398] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.871766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.879962] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 144.159156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.874926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.955123] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 145.032754] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 145.038943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.046468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.122796] 8021q: adding VLAN 0 to HW filter on device team0 2033/05/18 03:34:01 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 2033/05/18 03:34:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000200)="1f0000000104fffff13bdbc007110009f30501000b000240000000004f6644", 0x1f) 2033/05/18 03:34:01 executing program 6: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'bond0\x00', &(0x7f0000000380)=@ethtool_rxnfc={0x0, 0x0, 0x0, {0x0, @ether_spec={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, {'\bu', @link_local={0x1, 0x80, 0xc2}}, @esp_ip6_spec={@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {'8\\', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 0x1}}}}) 2033/05/18 03:34:01 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_fuse_mount(&(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) dup2(r0, r1) 2033/05/18 03:34:01 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_fuse_mount(&(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) dup2(r0, r1) 2033/05/18 03:34:01 executing program 7: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 2033/05/18 03:34:01 executing program 1: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 2033/05/18 03:34:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) mknod(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) acct(&(0x7f0000000380)='./file0/file0\x00') chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2033/05/18 03:34:01 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="0fc79fdb7100008fe86087341400660f6ae63e67660f38815d010f3800a6163f93c8660f38824249c4c1937c3a66baf80cb8d2ae4a8aef66bafc0cb007ee66f23e0f35660f6f6201", 0x48}], 0x1, 0x0, &(0x7f00000001c0), 0x0) [ 146.445348] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 146.459078] Process accounting resumed 2033/05/18 03:34:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) mknod(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) acct(&(0x7f0000000380)='./file0/file0\x00') chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2033/05/18 03:34:01 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x881) 2033/05/18 03:34:01 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="0fc79fdb7100008fe86087341400660f6ae63e67660f38815d010f3800a6163f93c8660f38824249c4c1937c3a66baf80cb8d2ae4a8aef66bafc0cb007ee66f23e0f35660f6f6201", 0x48}], 0x1, 0x0, &(0x7f00000001c0), 0x0) [ 146.607238] Process accounting resumed [ 146.616913] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:34:01 executing program 0: r0 = gettid() prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, r0) 2033/05/18 03:34:01 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) close(r0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 2033/05/18 03:34:01 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="0fc79fdb7100008fe86087341400660f6ae63e67660f38815d010f3800a6163f93c8660f38824249c4c1937c3a66baf80cb8d2ae4a8aef66bafc0cb007ee66f23e0f35660f6f6201", 0x48}], 0x1, 0x0, &(0x7f00000001c0), 0x0) 2033/05/18 03:34:01 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x881) [ 146.765864] device bridge_slave_1 left promiscuous mode [ 146.771595] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.786637] device bridge_slave_0 left promiscuous mode [ 146.792243] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.914604] team0 (unregistering): Port device team_slave_1 removed [ 146.936926] IPVS: ftp: loaded support on port[0] = 21 [ 146.943248] team0 (unregistering): Port device team_slave_0 removed [ 146.957560] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 146.974805] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 147.004542] bond0 (unregistering): Released all slaves [ 148.038390] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.044826] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.059322] device bridge_slave_0 entered promiscuous mode [ 148.131360] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.137822] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.149267] device bridge_slave_1 entered promiscuous mode [ 148.157875] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.164279] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.178517] device bridge_slave_0 entered promiscuous mode [ 148.231890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 148.251886] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.258480] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.282182] device bridge_slave_1 entered promiscuous mode [ 148.295189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 148.346579] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 148.396546] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 148.452499] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 148.510954] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 148.541338] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 148.579192] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 148.609464] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 148.616346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.626826] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 148.633950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.670496] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 148.677432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.722139] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 148.729727] team0: Port device team_slave_0 added [ 148.763659] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 148.771139] team0: Port device team_slave_1 added [ 148.780484] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 148.788000] team0: Port device team_slave_0 added [ 148.805224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.823738] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 148.831198] team0: Port device team_slave_1 added [ 148.842151] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.866954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.878462] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 148.885974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.894352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.907073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.930045] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 148.937342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.945831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.955813] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 148.963911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.971932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.999667] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 149.006862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.015396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.318304] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.324716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.331365] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.337715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.344953] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 149.384914] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.391341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.398049] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.404525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.411898] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 149.599131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.608603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.698576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.738420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.823264] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 150.860442] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 150.946492] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 150.952828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.960481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.000918] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 151.007252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.014777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.086526] 8021q: adding VLAN 0 to HW filter on device team0 [ 151.132327] 8021q: adding VLAN 0 to HW filter on device team0 2033/05/18 03:34:07 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 2033/05/18 03:34:07 executing program 0: r0 = gettid() prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, r0) 2033/05/18 03:34:07 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) close(r0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 2033/05/18 03:34:07 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="0fc79fdb7100008fe86087341400660f6ae63e67660f38815d010f3800a6163f93c8660f38824249c4c1937c3a66baf80cb8d2ae4a8aef66bafc0cb007ee66f23e0f35660f6f6201", 0x48}], 0x1, 0x0, &(0x7f00000001c0), 0x0) 2033/05/18 03:34:07 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x881) 2033/05/18 03:34:07 executing program 1: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) readv(r2, &(0x7f0000001180)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) sendmmsg$unix(r2, &(0x7f00000bd000), 0x492, 0x0) close(r1) 2033/05/18 03:34:07 executing program 7: mlockall(0x3) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 2033/05/18 03:34:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000001c0)={{0xf001, 0x0, 0x0, 0x401, 0x0, 0xfffffffffffffffa, 0x8, 0x81, 0x0, 0x0, 0x0, 0xd027}, {0x0, 0x0, 0x4, 0x80000000, 0x3f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4680}, {0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x101}, {0x0, 0x0, 0x23c6bd3cc6d77092, 0x9, 0x0, 0x0, 0x0, 0x78, 0x0, 0x1ff, 0x0, 0x1946}, {0x0, 0x5000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ab3, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x81, 0x7e, 0x0, 0x8, 0x0, 0x7f, 0x5}, {0x0, 0x2001, 0x0, 0x3, 0x0, 0xffffffff, 0x0, 0x4, 0x3, 0x6}, {0x0, 0xf001, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x4}, {0x1001}, {}, 0x40040021, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, [0x0, 0x6]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 2033/05/18 03:34:07 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) close(r0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 2033/05/18 03:34:07 executing program 0: r0 = gettid() prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, r0) 2033/05/18 03:34:07 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x881) 2033/05/18 03:34:07 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr}, {0x307, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bond_slave_0\x00'}) 2033/05/18 03:34:07 executing program 0: r0 = gettid() prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, r0) 2033/05/18 03:34:07 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) close(r0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 2033/05/18 03:34:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000140)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffff}, 0x13f}}, 0x20) write$rdma_cm(r0, &(0x7f0000000a40)=@set_option={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000940)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 2033/05/18 03:34:07 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr}, {0x307, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bond_slave_0\x00'}) [ 152.960309] device bridge_slave_1 left promiscuous mode [ 152.966195] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.017067] device bridge_slave_0 left promiscuous mode [ 153.022708] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.120367] team0 (unregistering): Port device team_slave_1 removed [ 153.132828] IPVS: ftp: loaded support on port[0] = 21 [ 153.146676] team0 (unregistering): Port device team_slave_0 removed [ 153.161296] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 153.177681] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 153.217412] bond0 (unregistering): Released all slaves [ 153.920197] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.926624] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.935185] device bridge_slave_0 entered promiscuous mode [ 153.973963] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.980394] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.987753] device bridge_slave_1 entered promiscuous mode [ 154.024063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 154.060572] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 154.184974] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 154.225323] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 154.395114] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 154.402920] team0: Port device team_slave_0 added [ 154.428994] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 154.436284] team0: Port device team_slave_1 added [ 154.470070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 154.509627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 154.540059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.577152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.811225] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.817601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.824238] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.830593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.837878] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 155.628784] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.706340] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 155.785533] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 155.791691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.799420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.806918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.874377] 8021q: adding VLAN 0 to HW filter on device team0 2033/05/18 03:34:11 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr}, {0x307, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bond_slave_0\x00'}) 2033/05/18 03:34:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000140)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffff}, 0x13f}}, 0x20) write$rdma_cm(r0, &(0x7f0000000a40)=@set_option={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000940)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 2033/05/18 03:34:11 executing program 1: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) readv(r2, &(0x7f0000001180)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) sendmmsg$unix(r2, &(0x7f00000bd000), 0x492, 0x0) close(r1) 2033/05/18 03:34:11 executing program 0: r0 = socket$inet(0x2b, 0x400000000000001, 0x1) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000340), &(0x7f0000000380), 0x8) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8912, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2=0xe0000002}}) 2033/05/18 03:34:11 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='.', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="646d61736b3d35372c63ba10465073656e7369746976653d6e6f3d377b2c757466382c64697361626c655f7370617273653d796573"]) 2033/05/18 03:34:11 executing program 4: prctl$intptr(0x26, 0x1) mknod(&(0x7f0000000080)='./file0\x00', 0x8, 0x0) execve(&(0x7f0000001000)='./file0\x00', &(0x7f0000002000), &(0x7f0000001000)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x60001, 0x80) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000000c0)={0x6, 0x8a4, 0x0, 0x0, 0x0, [], [], [], 0x8}) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) 2033/05/18 03:34:11 executing program 7: mlockall(0x3) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 2033/05/18 03:34:11 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/22, 0x16}, {&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/224, 0xe0}, {&(0x7f00000002c0)=""/157, 0x9d}, {&(0x7f0000000380)=""/71, 0x47}, {&(0x7f0000000400)}], 0x6) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xffff, 0x2) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000001940)={"cf9a519cba952499632d06c85c2cf65d658513614b84e785f7f7be8d6aec258d94cd02df9ce1c5b51553ae67ec33649239652344bde8f16cebf8bbb4cf0015e84733ef1007d25271c6c23cf3bc8bac631775be19c5d2ee926d6ec48d9e0514e0082e838512fcd978477a35852e12a10a613fc83c2c7c87127517e7e74437ef86ced236e4ea5823d63422613c9f262664756159a7ef8257de4aad364bd112c59d74b0ec62d3b8b6f920b90c390c27addd6c9767e4d7f62eb8660b675253dd12aa9bf4aa931404d6d5d6ce0e835f69b420561c864227e4f008f608d1e4b0e016d915d63097e3fb0b15285c75a5c3129cf395785700459148e845469694a0547fe6f61df40cc66b86840559406ce520f1ca0484fc73813ffdaafa21901c4539d1ad798bff4badfa1e52f08b03b0034d35c15846e638776ebfc7b561b10cfe72320a4e811b20158c2a1d2ab17d5c135b5cbc24261382a790129855513efd0d502f4159cc1d4b87582d92e2d21b63793a157a408758074c2dc4771e77a1c1a87735e39793e931bef67bae92e64bf78bd69e5c692103506fe7326c964c55fd8039f7fd1387895e19a3dd0d5567dd3224660d6b1a2ff7f0e3429e0eb72294b380a5c4f3cd81535c2d5547c4da26f03a09737c77c16158ef364d9bdb73ca3e02a48f5ab80faa817a55d69a6d6ac812321fa91b018696688cf683fdc3075da2b75549117d25db7797003e39ac3cecae9a8af3e8158490301d7d50e734ea071374a88a486cfc4123df0e64d770057253a52109000587e53febdad41f136a8d8f65aeb1e700280d9cf0895ffe8530e5e2fdec744859de860d0e3e92dfa38f9dc9e7fab2e22b5775c2cd17cc2976c65c1a9a2904ae94c66c2e69d06edd2589a15f854f9fc7aa484267f5e812e3dacbcdde8df40d0a6f48bad8a619af6367a64d9b1bf8a1bfe69059320b22c259f82ed33f11882c9c0e72d1a14f3107354a7c1af47b383847169a9db409ecbcbbe689eca8c3c621af263295bd80d9b567bddbc10d3572f9fa4b49f84542475a24d0fdd506dd29caf4cf1a685170fdacb5e51aa113e344e4478fb273f83c44ac7d1e7c1496aedf03277d158dc04e8e2ef79fb8a43e02779c9d84092e2345215426be03f98a73de5caa9f8883834ac3fe6cce79d657048638e215dbb87c23e7e5e9476fe03252774aa47d787f0ee281d24844cbc77983526b5b3e76d393d379c417e5fdd009af07ec7de7b053e8430d1576249857795fd3fbb22720c6b7db63eec0ceb18c5263d3856020f12f7bdf63a8d9983b7cdadd00271758f164daee3344cc8d1824aaaf76545ee30ca4dcd99b355baf4a6dd04d61b76ef5db8f1d28a75f99181d977d6eb64eb3889df3a50136b134da5d2aae503afc0546ba1cc67c775563f9a427b9990b1056636d4c49b52a79c6bb1c52d2871620c707"}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000003c0)={"a2f44c7487f7a2b1cdfaf678d717da9b45a94f36c3531e5b1ed000ee615f091985964e14474bab91a86857ead2e98efdb030821ffc94c5e52a260d7ad6ba42c4050ed346f887af8f6cb219f472e4acf08ae6adab2fa9cb8745b87e9d4bcc5ff753b681ecdad13a966ee0300582e2d8c720582d90f0026062fd9ba1a8e07addcbb552a3add4d5e8d59a32faeb3dde0b63a33f9a90918ca8e05e1e866b02e388c759c64708a3e12635521df7a2e0b458b75e56f64959954d38c4c9338a333890a0a29c37ab34fc797062b2ea41c55869b40458f04b52233fd4ecd5abc181d876d14b7850edb9c8a863cc6db0f9d5b55fa24d76747e6eae1d0f73003d52ca2a8d9d53659d6716ab52402304870e6cd2c993f953ee0c63eab478eb6ea5910048255ef506ae6bdb2a07a55a38b41b852de0da8a1e69a93dda5779919f3a5feee7b2dfe93239c5109fff770dec75f425a38e131ff07df2ff8f9cbc73f4e6ddb382ead13fc02a15ba7258971e32f17ffadebf44f7cdf9713336f3254fbd0ee125824eb148ee3850e774b461eb1a5b918d70fd91c654767b953352c22163335a4386141166f38d6dac431bb830bd98bf816d993e3fa9290f7924f7ffd29aad19d1cebe77e5f65971678a02dcff1bb63ba3d3d57ca5766ca437098675e3306c891654186b2de6a152b01d6979b8654d38d96ee4dd9efc6453c19f0d44abd7dbd91c884d4c4472fdd1539b13937a48bc96b03344c4a0598fc5fc993d9ab01f6e61a61ce504084204b1d253a6af85ae87feca1463f983d04d3648602b3ee6614af91f125315af67d31f28f008df88dbd054441fa6068f2332ac11a82c4a62b5ba8092032a31086c6504e9a2406ab66a6cbdf58d1d2f7b8ff7ee69d8ce77681e2153df03f844db46e240bddec89b8ea7a8e1cbb47ffee1ca0d34e4ac5adf88f994314ccf34039f999a6f0345c2bf743b57a53ef0779ff7139fbc1777ca6070af5be48be164ecf5c09604e0b3bb66e0039f2ffba995ded013874a74c8ecff77a0c496b6809f8ace482441791fde21a7de1baa6722b7bcaac77733df58fec7983ed0501c62353da4e5050734e7d55f61a37abb8d7540aba33bbb5667a1d3d85dadd3f0ce41d3e661d704c4c176099f4d9b6034ba10d0ea5df98e57d512289285317009d640e6af72d4bd06fff0c3f8ab975a20af7eb5a18c24e641ce46ff7ce0c52d9b7ed2bdfa6b2d8b485764e8504ee9c427535b972385f679c9ef9e1a2bd85cfc6d051aec133629fad318707e28af1c39a680c0de826245ef1f1a1458593ac80696c87d9369301b901dd4e42467cbfeedbad5dae354f31d8c9afea00136b35a180b2829c1b75f2229592f700fe993622f55c34a265cb9ee32c93ad4d90a24efe4c5b2495addcc08636ebf2929d819d3315107b31265de45c4ba75cce2ff84db385f317c331d"}) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000007c0)={"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"}) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r5, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000001180)=0x6, 0x1) sendto$llc(r0, &(0x7f0000001140), 0x70017818c9caa5a0, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) [ 156.402346] ntfs: (device loop3): parse_options(): Unrecognized mount option cºFPsensitive. [ 156.411047] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 156.505900] ntfs: (device loop3): parse_options(): Unrecognized mount option cºFPsensitive. [ 156.514649] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 2033/05/18 03:34:12 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr}, {0x307, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bond_slave_0\x00'}) 2033/05/18 03:34:12 executing program 4: prctl$intptr(0x26, 0x1) mknod(&(0x7f0000000080)='./file0\x00', 0x8, 0x0) execve(&(0x7f0000001000)='./file0\x00', &(0x7f0000002000), &(0x7f0000001000)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x60001, 0x80) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000000c0)={0x6, 0x8a4, 0x0, 0x0, 0x0, [], [], [], 0x8}) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) 2033/05/18 03:34:12 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='.', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="646d61736b3d35372c63ba10465073656e7369746976653d6e6f3d377b2c757466382c64697361626c655f7370617273653d796573"]) 2033/05/18 03:34:12 executing program 0: r0 = socket$inet(0x2b, 0x400000000000001, 0x1) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000340), &(0x7f0000000380), 0x8) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8912, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2=0xe0000002}}) 2033/05/18 03:34:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000140)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffff}, 0x13f}}, 0x20) write$rdma_cm(r0, &(0x7f0000000a40)=@set_option={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000940)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 2033/05/18 03:34:12 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/22, 0x16}, {&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/224, 0xe0}, {&(0x7f00000002c0)=""/157, 0x9d}, {&(0x7f0000000380)=""/71, 0x47}, {&(0x7f0000000400)}], 0x6) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xffff, 0x2) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000001940)={"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"}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000003c0)={"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"}) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000007c0)={"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"}) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r5, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000001180)=0x6, 0x1) sendto$llc(r0, &(0x7f0000001140), 0x70017818c9caa5a0, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2033/05/18 03:34:12 executing program 7: mlockall(0x3) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 2033/05/18 03:34:12 executing program 1: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) readv(r2, &(0x7f0000001180)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) sendmmsg$unix(r2, &(0x7f00000bd000), 0x492, 0x0) close(r1) 2033/05/18 03:34:12 executing program 4: prctl$intptr(0x26, 0x1) mknod(&(0x7f0000000080)='./file0\x00', 0x8, 0x0) execve(&(0x7f0000001000)='./file0\x00', &(0x7f0000002000), &(0x7f0000001000)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x60001, 0x80) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000000c0)={0x6, 0x8a4, 0x0, 0x0, 0x0, [], [], [], 0x8}) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) 2033/05/18 03:34:12 executing program 6: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/22, 0x16}, {&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/224, 0xe0}, {&(0x7f00000002c0)=""/157, 0x9d}, {&(0x7f0000000380)=""/71, 0x47}, {&(0x7f0000000400)}], 0x6) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xffff, 0x2) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000001940)={"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"}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000003c0)={"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"}) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000007c0)={"0006d92ac2987ab6ce000df10d3269fa08fd357c49d8fadf570a2ed86d0bc1995a963d635c8048f86d055dddfa0c384d5b185008b71f7e5a8ac719e8e41ec8d12664ed0a280ff548cd5c70d39da7870c933f03652135f46aa731329530d162bd45222809d83f3e404d1457065f5e1c21dded794e150badce6fd788ea6e9d7ceb2ef9083f5aa5626cd579deb5e77944898bc0a0a7b471a588b6022094cddbe125067bc2a2545ed8c78c89877c0a547c23da47ce5a8f8adc626cbeed657573c39629f654442c72444dada486c7e6e4ce47fcf606b4bd061250e2a7014c918c60d4fc49d89c9ea85d4b6eaaa1be818f5312dbadbc33f85651cb422a70af753fd7ea2dae99d5baa7214c9b2611b5b17c3c98680225ceebea1f77f272c87fcce407ca44bd5976aec4839b1083f2258bc1dc375d1e130203436dd72ef923773c263be0dbe22390834a619f70e792973ee6468366c974ac466a41bd67d898a1f368d44feb5e779658e6f9c682956a02f0f2df770e91b417ef75f308da34635908cd586d6d55354ad5b4a73f4e881f5362dfdc16604a7b18f68d34e9186a93b6aac5286681764db964fdd5f8a700ca6abf7c0f54ff39a6509d6c9ee5b6a2ec4fae0e18972ae016cc8308b954ec9bbd005ae5876430c11b8abb47656be7f6051448eac60fac28b2dc5646b8141b9e992eac801babffe369c5d30e9f45ee0cafaed698d385ca7019b72a914d9f26db8af1f99b65317a43c1b0b65b0c5dd4bdb78d924bf4e60774a93013f6fe8a765cd706706e1b7c740a120ba4928ba174bda6758a442cecac78b791d165bc07615c6d63f6fd182ed5a62ac955bde98e2f19358f7d3443478940f33745c0210fbd74caa5d35c63dc4d21dbc16f53c551d0b16ed80eb18b390d4cf51198376d600d37125d66401ab385bd5eed69540f3106677003722ab1037a4d55a327ebd60245893e315d31d2bba584db6fee58687d29d995fb3b2139547627437f8fdcacebfa0ea84cadcb30f585a32e2bd731d6282b75862b9ed7d1b55d3901762f1db43be4c6abed8e8d7452d04ccf664efbcf6f173c3367098ea62126c186be24acd52bce7589ba0253bcaecc99cba84106f3ba5d1341ff64bd328f28cf87ee22fba9b9015b849e726093f1dc0e2867362546e13178a96992d04217c64ca7b0b402ddf94c157b2705dd57079a68abafe72330ff32d10be3a2cee845dd6e7ce471770985b440cfe70bbacdac49af0edf216438138285f4968adb27a79aa6978a86f2eed5d4c2d6fa99ebe8e858214ef854050f9c5a30af4e84a121f696a94ee138cbf37f1999ffaeeab9ad17cceffa9b0e69a93edadd2a32993181bd1a1d1b3455e81fea1294dc85ed1b9848e62b3e32f483e487205d68b01906389d4abbee03e07f7125b04ac8e90b7bed31ffd851f8046307cda6777c56b2b6f4f6"}) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r5, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000001180)=0x6, 0x1) sendto$llc(r0, &(0x7f0000001140), 0x70017818c9caa5a0, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) [ 157.522016] ntfs: (device loop3): parse_options(): Unrecognized mount option cºFPsensitive. [ 157.530734] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 2033/05/18 03:34:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000140)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffff}, 0x13f}}, 0x20) write$rdma_cm(r0, &(0x7f0000000a40)=@set_option={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000940)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 2033/05/18 03:34:12 executing program 0: r0 = socket$inet(0x2b, 0x400000000000001, 0x1) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000340), &(0x7f0000000380), 0x8) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8912, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2=0xe0000002}}) 2033/05/18 03:34:12 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='.', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="646d61736b3d35372c63ba10465073656e7369746976653d6e6f3d377b2c757466382c64697361626c655f7370617273653d796573"]) 2033/05/18 03:34:12 executing program 0: r0 = socket$inet(0x2b, 0x400000000000001, 0x1) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000340), &(0x7f0000000380), 0x8) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8912, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2=0xe0000002}}) [ 157.754446] ntfs: (device loop3): parse_options(): Unrecognized mount option cºFPsensitive. [ 157.763109] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 2033/05/18 03:34:13 executing program 4: prctl$intptr(0x26, 0x1) mknod(&(0x7f0000000080)='./file0\x00', 0x8, 0x0) execve(&(0x7f0000001000)='./file0\x00', &(0x7f0000002000), &(0x7f0000001000)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x60001, 0x80) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000000c0)={0x6, 0x8a4, 0x0, 0x0, 0x0, [], [], [], 0x8}) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) 2033/05/18 03:34:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) 2033/05/18 03:34:13 executing program 0: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) bind$packet(r0, &(0x7f0000000240)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x2, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0x7f000001, @remote={0xac, 0x14, 0x14, 0xbb}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x0, 0x5c8]}) 2033/05/18 03:34:13 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='.', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="646d61736b3d35372c63ba10465073656e7369746976653d6e6f3d377b2c757466382c64697361626c655f7370617273653d796573"]) 2033/05/18 03:34:13 executing program 7: mlockall(0x3) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 2033/05/18 03:34:13 executing program 1: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) readv(r2, &(0x7f0000001180)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) sendmmsg$unix(r2, &(0x7f00000bd000), 0x492, 0x0) close(r1) 2033/05/18 03:34:13 executing program 6: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/22, 0x16}, {&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/224, 0xe0}, {&(0x7f00000002c0)=""/157, 0x9d}, {&(0x7f0000000380)=""/71, 0x47}, {&(0x7f0000000400)}], 0x6) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xffff, 0x2) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000001940)={"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"}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000003c0)={"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"}) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000007c0)={"0006d92ac2987ab6ce000df10d3269fa08fd357c49d8fadf570a2ed86d0bc1995a963d635c8048f86d055dddfa0c384d5b185008b71f7e5a8ac719e8e41ec8d12664ed0a280ff548cd5c70d39da7870c933f03652135f46aa731329530d162bd45222809d83f3e404d1457065f5e1c21dded794e150badce6fd788ea6e9d7ceb2ef9083f5aa5626cd579deb5e77944898bc0a0a7b471a588b6022094cddbe125067bc2a2545ed8c78c89877c0a547c23da47ce5a8f8adc626cbeed657573c39629f654442c72444dada486c7e6e4ce47fcf606b4bd061250e2a7014c918c60d4fc49d89c9ea85d4b6eaaa1be818f5312dbadbc33f85651cb422a70af753fd7ea2dae99d5baa7214c9b2611b5b17c3c98680225ceebea1f77f272c87fcce407ca44bd5976aec4839b1083f2258bc1dc375d1e130203436dd72ef923773c263be0dbe22390834a619f70e792973ee6468366c974ac466a41bd67d898a1f368d44feb5e779658e6f9c682956a02f0f2df770e91b417ef75f308da34635908cd586d6d55354ad5b4a73f4e881f5362dfdc16604a7b18f68d34e9186a93b6aac5286681764db964fdd5f8a700ca6abf7c0f54ff39a6509d6c9ee5b6a2ec4fae0e18972ae016cc8308b954ec9bbd005ae5876430c11b8abb47656be7f6051448eac60fac28b2dc5646b8141b9e992eac801babffe369c5d30e9f45ee0cafaed698d385ca7019b72a914d9f26db8af1f99b65317a43c1b0b65b0c5dd4bdb78d924bf4e60774a93013f6fe8a765cd706706e1b7c740a120ba4928ba174bda6758a442cecac78b791d165bc07615c6d63f6fd182ed5a62ac955bde98e2f19358f7d3443478940f33745c0210fbd74caa5d35c63dc4d21dbc16f53c551d0b16ed80eb18b390d4cf51198376d600d37125d66401ab385bd5eed69540f3106677003722ab1037a4d55a327ebd60245893e315d31d2bba584db6fee58687d29d995fb3b2139547627437f8fdcacebfa0ea84cadcb30f585a32e2bd731d6282b75862b9ed7d1b55d3901762f1db43be4c6abed8e8d7452d04ccf664efbcf6f173c3367098ea62126c186be24acd52bce7589ba0253bcaecc99cba84106f3ba5d1341ff64bd328f28cf87ee22fba9b9015b849e726093f1dc0e2867362546e13178a96992d04217c64ca7b0b402ddf94c157b2705dd57079a68abafe72330ff32d10be3a2cee845dd6e7ce471770985b440cfe70bbacdac49af0edf216438138285f4968adb27a79aa6978a86f2eed5d4c2d6fa99ebe8e858214ef854050f9c5a30af4e84a121f696a94ee138cbf37f1999ffaeeab9ad17cceffa9b0e69a93edadd2a32993181bd1a1d1b3455e81fea1294dc85ed1b9848e62b3e32f483e487205d68b01906389d4abbee03e07f7125b04ac8e90b7bed31ffd851f8046307cda6777c56b2b6f4f6"}) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r5, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000001180)=0x6, 0x1) sendto$llc(r0, &(0x7f0000001140), 0x70017818c9caa5a0, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2033/05/18 03:34:13 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/22, 0x16}, {&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/224, 0xe0}, {&(0x7f00000002c0)=""/157, 0x9d}, {&(0x7f0000000380)=""/71, 0x47}, {&(0x7f0000000400)}], 0x6) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xffff, 0x2) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000001940)={"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"}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000003c0)={"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"}) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000007c0)={"0006d92ac2987ab6ce000df10d3269fa08fd357c49d8fadf570a2ed86d0bc1995a963d635c8048f86d055dddfa0c384d5b185008b71f7e5a8ac719e8e41ec8d12664ed0a280ff548cd5c70d39da7870c933f03652135f46aa731329530d162bd45222809d83f3e404d1457065f5e1c21dded794e150badce6fd788ea6e9d7ceb2ef9083f5aa5626cd579deb5e77944898bc0a0a7b471a588b6022094cddbe125067bc2a2545ed8c78c89877c0a547c23da47ce5a8f8adc626cbeed657573c39629f654442c72444dada486c7e6e4ce47fcf606b4bd061250e2a7014c918c60d4fc49d89c9ea85d4b6eaaa1be818f5312dbadbc33f85651cb422a70af753fd7ea2dae99d5baa7214c9b2611b5b17c3c98680225ceebea1f77f272c87fcce407ca44bd5976aec4839b1083f2258bc1dc375d1e130203436dd72ef923773c263be0dbe22390834a619f70e792973ee6468366c974ac466a41bd67d898a1f368d44feb5e779658e6f9c682956a02f0f2df770e91b417ef75f308da34635908cd586d6d55354ad5b4a73f4e881f5362dfdc16604a7b18f68d34e9186a93b6aac5286681764db964fdd5f8a700ca6abf7c0f54ff39a6509d6c9ee5b6a2ec4fae0e18972ae016cc8308b954ec9bbd005ae5876430c11b8abb47656be7f6051448eac60fac28b2dc5646b8141b9e992eac801babffe369c5d30e9f45ee0cafaed698d385ca7019b72a914d9f26db8af1f99b65317a43c1b0b65b0c5dd4bdb78d924bf4e60774a93013f6fe8a765cd706706e1b7c740a120ba4928ba174bda6758a442cecac78b791d165bc07615c6d63f6fd182ed5a62ac955bde98e2f19358f7d3443478940f33745c0210fbd74caa5d35c63dc4d21dbc16f53c551d0b16ed80eb18b390d4cf51198376d600d37125d66401ab385bd5eed69540f3106677003722ab1037a4d55a327ebd60245893e315d31d2bba584db6fee58687d29d995fb3b2139547627437f8fdcacebfa0ea84cadcb30f585a32e2bd731d6282b75862b9ed7d1b55d3901762f1db43be4c6abed8e8d7452d04ccf664efbcf6f173c3367098ea62126c186be24acd52bce7589ba0253bcaecc99cba84106f3ba5d1341ff64bd328f28cf87ee22fba9b9015b849e726093f1dc0e2867362546e13178a96992d04217c64ca7b0b402ddf94c157b2705dd57079a68abafe72330ff32d10be3a2cee845dd6e7ce471770985b440cfe70bbacdac49af0edf216438138285f4968adb27a79aa6978a86f2eed5d4c2d6fa99ebe8e858214ef854050f9c5a30af4e84a121f696a94ee138cbf37f1999ffaeeab9ad17cceffa9b0e69a93edadd2a32993181bd1a1d1b3455e81fea1294dc85ed1b9848e62b3e32f483e487205d68b01906389d4abbee03e07f7125b04ac8e90b7bed31ffd851f8046307cda6777c56b2b6f4f6"}) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r5, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000001180)=0x6, 0x1) sendto$llc(r0, &(0x7f0000001140), 0x70017818c9caa5a0, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) [ 158.674547] ntfs: (device loop3): parse_options(): Unrecognized mount option cºFPsensitive. [ 158.683205] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 158.683601] device lo entered promiscuous mode 2033/05/18 03:34:13 executing program 4: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:34:13 executing program 0: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) bind$packet(r0, &(0x7f0000000240)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x2, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0x7f000001, @remote={0xac, 0x14, 0x14, 0xbb}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x0, 0x5c8]}) 2033/05/18 03:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(generic-gcm-aesni)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x10) 2033/05/18 03:34:13 executing program 0: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) bind$packet(r0, &(0x7f0000000240)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x2, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0x7f000001, @remote={0xac, 0x14, 0x14, 0xbb}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x0, 0x5c8]}) [ 158.836535] device lo left promiscuous mode 2033/05/18 03:34:13 executing program 4: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:34:13 executing program 2: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:34:13 executing program 0: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) bind$packet(r0, &(0x7f0000000240)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x2, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0x7f000001, @remote={0xac, 0x14, 0x14, 0xbb}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x0, 0x5c8]}) 2033/05/18 03:34:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f0000b31000)="f9", 0x1, 0x0, &(0x7f00009e1000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x67) listen(r0, 0x87) accept(r0, &(0x7f00005a4000)=@rc, &(0x7f0000918000)=0x9) 2033/05/18 03:34:13 executing program 2: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 159.135737] device bridge_slave_1 left promiscuous mode [ 159.141341] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.165432] device bridge_slave_0 left promiscuous mode [ 159.171164] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.208812] team0 (unregistering): Port device team_slave_1 removed [ 159.219602] team0 (unregistering): Port device team_slave_0 removed [ 159.232048] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 159.248452] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 159.280760] bond0 (unregistering): Released all slaves 2033/05/18 03:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(generic-gcm-aesni)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x10) 2033/05/18 03:34:14 executing program 4: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:34:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) 2033/05/18 03:34:14 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2033/05/18 03:34:14 executing program 2: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:34:14 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f0000b31000)="f9", 0x1, 0x0, &(0x7f00009e1000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x67) listen(r0, 0x87) accept(r0, &(0x7f00005a4000)=@rc, &(0x7f0000918000)=0x9) 2033/05/18 03:34:14 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/22, 0x16}, {&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/224, 0xe0}, {&(0x7f00000002c0)=""/157, 0x9d}, {&(0x7f0000000380)=""/71, 0x47}, {&(0x7f0000000400)}], 0x6) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xffff, 0x2) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000001940)={"cf9a519cba952499632d06c85c2cf65d658513614b84e785f7f7be8d6aec258d94cd02df9ce1c5b51553ae67ec33649239652344bde8f16cebf8bbb4cf0015e84733ef1007d25271c6c23cf3bc8bac631775be19c5d2ee926d6ec48d9e0514e0082e838512fcd978477a35852e12a10a613fc83c2c7c87127517e7e74437ef86ced236e4ea5823d63422613c9f262664756159a7ef8257de4aad364bd112c59d74b0ec62d3b8b6f920b90c390c27addd6c9767e4d7f62eb8660b675253dd12aa9bf4aa931404d6d5d6ce0e835f69b420561c864227e4f008f608d1e4b0e016d915d63097e3fb0b15285c75a5c3129cf395785700459148e845469694a0547fe6f61df40cc66b86840559406ce520f1ca0484fc73813ffdaafa21901c4539d1ad798bff4badfa1e52f08b03b0034d35c15846e638776ebfc7b561b10cfe72320a4e811b20158c2a1d2ab17d5c135b5cbc24261382a790129855513efd0d502f4159cc1d4b87582d92e2d21b63793a157a408758074c2dc4771e77a1c1a87735e39793e931bef67bae92e64bf78bd69e5c692103506fe7326c964c55fd8039f7fd1387895e19a3dd0d5567dd3224660d6b1a2ff7f0e3429e0eb72294b380a5c4f3cd81535c2d5547c4da26f03a09737c77c16158ef364d9bdb73ca3e02a48f5ab80faa817a55d69a6d6ac812321fa91b018696688cf683fdc3075da2b75549117d25db7797003e39ac3cecae9a8af3e8158490301d7d50e734ea071374a88a486cfc4123df0e64d770057253a52109000587e53febdad41f136a8d8f65aeb1e700280d9cf0895ffe8530e5e2fdec744859de860d0e3e92dfa38f9dc9e7fab2e22b5775c2cd17cc2976c65c1a9a2904ae94c66c2e69d06edd2589a15f854f9fc7aa484267f5e812e3dacbcdde8df40d0a6f48bad8a619af6367a64d9b1bf8a1bfe69059320b22c259f82ed33f11882c9c0e72d1a14f3107354a7c1af47b383847169a9db409ecbcbbe689eca8c3c621af263295bd80d9b567bddbc10d3572f9fa4b49f84542475a24d0fdd506dd29caf4cf1a685170fdacb5e51aa113e344e4478fb273f83c44ac7d1e7c1496aedf03277d158dc04e8e2ef79fb8a43e02779c9d84092e2345215426be03f98a73de5caa9f8883834ac3fe6cce79d657048638e215dbb87c23e7e5e9476fe03252774aa47d787f0ee281d24844cbc77983526b5b3e76d393d379c417e5fdd009af07ec7de7b053e8430d1576249857795fd3fbb22720c6b7db63eec0ceb18c5263d3856020f12f7bdf63a8d9983b7cdadd00271758f164daee3344cc8d1824aaaf76545ee30ca4dcd99b355baf4a6dd04d61b76ef5db8f1d28a75f99181d977d6eb64eb3889df3a50136b134da5d2aae503afc0546ba1cc67c775563f9a427b9990b1056636d4c49b52a79c6bb1c52d2871620c707"}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000003c0)={"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"}) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000007c0)={"0006d92ac2987ab6ce000df10d3269fa08fd357c49d8fadf570a2ed86d0bc1995a963d635c8048f86d055dddfa0c384d5b185008b71f7e5a8ac719e8e41ec8d12664ed0a280ff548cd5c70d39da7870c933f03652135f46aa731329530d162bd45222809d83f3e404d1457065f5e1c21dded794e150badce6fd788ea6e9d7ceb2ef9083f5aa5626cd579deb5e77944898bc0a0a7b471a588b6022094cddbe125067bc2a2545ed8c78c89877c0a547c23da47ce5a8f8adc626cbeed657573c39629f654442c72444dada486c7e6e4ce47fcf606b4bd061250e2a7014c918c60d4fc49d89c9ea85d4b6eaaa1be818f5312dbadbc33f85651cb422a70af753fd7ea2dae99d5baa7214c9b2611b5b17c3c98680225ceebea1f77f272c87fcce407ca44bd5976aec4839b1083f2258bc1dc375d1e130203436dd72ef923773c263be0dbe22390834a619f70e792973ee6468366c974ac466a41bd67d898a1f368d44feb5e779658e6f9c682956a02f0f2df770e91b417ef75f308da34635908cd586d6d55354ad5b4a73f4e881f5362dfdc16604a7b18f68d34e9186a93b6aac5286681764db964fdd5f8a700ca6abf7c0f54ff39a6509d6c9ee5b6a2ec4fae0e18972ae016cc8308b954ec9bbd005ae5876430c11b8abb47656be7f6051448eac60fac28b2dc5646b8141b9e992eac801babffe369c5d30e9f45ee0cafaed698d385ca7019b72a914d9f26db8af1f99b65317a43c1b0b65b0c5dd4bdb78d924bf4e60774a93013f6fe8a765cd706706e1b7c740a120ba4928ba174bda6758a442cecac78b791d165bc07615c6d63f6fd182ed5a62ac955bde98e2f19358f7d3443478940f33745c0210fbd74caa5d35c63dc4d21dbc16f53c551d0b16ed80eb18b390d4cf51198376d600d37125d66401ab385bd5eed69540f3106677003722ab1037a4d55a327ebd60245893e315d31d2bba584db6fee58687d29d995fb3b2139547627437f8fdcacebfa0ea84cadcb30f585a32e2bd731d6282b75862b9ed7d1b55d3901762f1db43be4c6abed8e8d7452d04ccf664efbcf6f173c3367098ea62126c186be24acd52bce7589ba0253bcaecc99cba84106f3ba5d1341ff64bd328f28cf87ee22fba9b9015b849e726093f1dc0e2867362546e13178a96992d04217c64ca7b0b402ddf94c157b2705dd57079a68abafe72330ff32d10be3a2cee845dd6e7ce471770985b440cfe70bbacdac49af0edf216438138285f4968adb27a79aa6978a86f2eed5d4c2d6fa99ebe8e858214ef854050f9c5a30af4e84a121f696a94ee138cbf37f1999ffaeeab9ad17cceffa9b0e69a93edadd2a32993181bd1a1d1b3455e81fea1294dc85ed1b9848e62b3e32f483e487205d68b01906389d4abbee03e07f7125b04ac8e90b7bed31ffd851f8046307cda6777c56b2b6f4f6"}) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r5, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000001180)=0x6, 0x1) sendto$llc(r0, &(0x7f0000001140), 0x70017818c9caa5a0, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2033/05/18 03:34:14 executing program 6: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/22, 0x16}, {&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/224, 0xe0}, {&(0x7f00000002c0)=""/157, 0x9d}, {&(0x7f0000000380)=""/71, 0x47}, {&(0x7f0000000400)}], 0x6) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xffff, 0x2) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000001940)={"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"}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000003c0)={"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"}) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000007c0)={"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"}) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r5, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000001180)=0x6, 0x1) sendto$llc(r0, &(0x7f0000001140), 0x70017818c9caa5a0, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2033/05/18 03:34:14 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2033/05/18 03:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(generic-gcm-aesni)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x10) 2033/05/18 03:34:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) [ 160.257514] IPVS: ftp: loaded support on port[0] = 21 [ 160.267299] IPVS: ftp: loaded support on port[0] = 21 [ 160.701372] device bridge_slave_1 left promiscuous mode [ 160.707080] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.717631] device bridge_slave_0 left promiscuous mode [ 160.723180] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.760557] team0 (unregistering): Port device team_slave_1 removed [ 160.772458] team0 (unregistering): Port device team_slave_0 removed [ 160.782605] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 160.797786] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 160.828173] bond0 (unregistering): Released all slaves [ 161.382670] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.389123] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.404991] device bridge_slave_0 entered promiscuous mode [ 161.474951] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.481369] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.491889] device bridge_slave_1 entered promiscuous mode [ 161.504212] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.510621] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.525230] device bridge_slave_0 entered promiscuous mode [ 161.578512] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 161.593045] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.599453] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.613254] device bridge_slave_1 entered promiscuous mode [ 161.666217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 161.685835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 161.760286] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 161.882005] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 161.962456] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 161.972044] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 162.041443] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 162.050448] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 162.060601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.090673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 162.097605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.114451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 162.121662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.183574] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 162.190757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.285139] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 162.292536] team0: Port device team_slave_0 added [ 162.335829] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.343462] team0: Port device team_slave_1 added [ 162.351627] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 162.359151] team0: Port device team_slave_0 added [ 162.377287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.401389] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.408657] team0: Port device team_slave_1 added [ 162.417524] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.443752] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.455264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 162.462892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.471472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.482903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.508162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 162.515490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.523911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.535545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 162.542739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.550991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.586536] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 162.593787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.602130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.905270] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.911684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.918351] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.924706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.932144] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 162.971269] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.977688] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.984346] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.990729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.998090] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 163.024124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.037618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.250728] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.305086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.378668] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 164.438536] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 164.505960] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 164.512608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.520493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.563882] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 164.570137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.584640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.652736] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.692304] 8021q: adding VLAN 0 to HW filter on device team0 2033/05/18 03:34:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(generic-gcm-aesni)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x10) 2033/05/18 03:34:20 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2033/05/18 03:34:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) 2033/05/18 03:34:20 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) 2033/05/18 03:34:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f0000b31000)="f9", 0x1, 0x0, &(0x7f00009e1000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x67) listen(r0, 0x87) accept(r0, &(0x7f00005a4000)=@rc, &(0x7f0000918000)=0x9) 2033/05/18 03:34:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) 2033/05/18 03:34:20 executing program 4: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:34:20 executing program 2: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xc37a) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x0, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, 0x0, 0x0, r0, 0x0) recvmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000023c0)="56125a44390d7cbbdf2badd5dd2d5f172bb70a406049a6bd45e38faed5fa5eebd4db40dc83e1e469b14592f615f4cd1a683b4cfe6f5740278c2e9cb8759912681abb") mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000002680)={r0, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x0, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2033/05/18 03:34:20 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000)=0x405, 0x4) 2033/05/18 03:34:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) 2033/05/18 03:34:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) 2033/05/18 03:34:20 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) 2033/05/18 03:34:20 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2033/05/18 03:34:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x8941, 0x0, &(0x7f0000000080)) [ 165.742566] ================================================================== [ 165.750200] BUG: KASAN: null-ptr-deref in refcount_inc_not_zero+0x8f/0x2d0 [ 165.757220] Read of size 4 at addr 0000000000000004 by task syz-executor3/12495 [ 165.764659] [ 165.766292] CPU: 1 PID: 12495 Comm: syz-executor3 Not tainted 4.17.0-rc1+ #10 [ 165.773546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.782884] Call Trace: [ 165.785465] dump_stack+0x1b9/0x294 [ 165.789081] ? dump_stack_print_info.cold.2+0x52/0x52 [ 165.794255] ? kasan_check_write+0x14/0x20 [ 165.798478] ? do_raw_spin_lock+0xc1/0x200 [ 165.802713] ? vprintk_func+0x81/0xe7 [ 165.806510] ? refcount_inc_not_zero+0x8f/0x2d0 [ 165.811163] kasan_report.cold.7+0x6d/0x2fe [ 165.815474] check_memory_region+0x13e/0x1b0 [ 165.819880] kasan_check_read+0x11/0x20 [ 165.823840] refcount_inc_not_zero+0x8f/0x2d0 [ 165.828324] ? refcount_add_not_zero+0x320/0x320 [ 165.833068] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 165.838068] ? lock_sock_nested+0x9f/0x120 [ 165.842295] refcount_inc+0x15/0x70 [ 165.845909] llc_ui_release+0xba/0x2b0 [ 165.849790] ? fsnotify_first_mark+0x330/0x330 [ 165.854368] sock_release+0x96/0x1b0 [ 165.858068] ? sock_alloc_file+0x4e0/0x4e0 [ 165.862291] sock_close+0x16/0x20 [ 165.865728] __fput+0x34d/0x890 [ 165.868995] ? fput+0x1a0/0x1a0 [ 165.872285] ? _raw_spin_unlock_irq+0x27/0x70 [ 165.876769] ____fput+0x15/0x20 [ 165.880037] task_work_run+0x1e4/0x290 [ 165.883920] ? task_work_cancel+0x240/0x240 [ 165.888230] ? switch_task_namespaces+0xbd/0xd0 [ 165.892885] do_exit+0x1aee/0x2730 [ 165.896422] ? mm_update_next_owner+0x980/0x980 [ 165.901074] ? print_usage_bug+0xc0/0xc0 [ 165.905124] ? check_same_owner+0x320/0x320 [ 165.909433] ? do_raw_spin_unlock+0x9e/0x2e0 [ 165.913832] ? rcu_note_context_switch+0x710/0x710 [ 165.918746] ? lock_acquire+0x1dc/0x520 [ 165.922716] ? __might_sleep+0x95/0x190 [ 165.926683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 165.932206] ? __lock_acquire+0x7f5/0x5140 [ 165.936438] ? kasan_check_write+0x14/0x20 [ 165.940660] ? do_raw_spin_lock+0xc1/0x200 [ 165.944880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 165.950413] ? debug_check_no_locks_freed+0x310/0x310 [ 165.955595] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 165.960777] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 165.966305] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 165.971397] ? futex_wait+0x5c1/0x9f0 [ 165.975196] ? futex_wait_setup+0x400/0x400 [ 165.979506] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 165.984683] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 165.990211] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 165.995301] ? futex_wake+0x2f6/0x750 [ 165.999086] ? graph_lock+0x170/0x170 [ 166.002879] ? memset+0x31/0x40 [ 166.006149] ? find_held_lock+0x36/0x1c0 [ 166.011087] ? lock_downgrade+0x8e0/0x8e0 [ 166.015231] do_group_exit+0x16f/0x430 [ 166.019106] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 166.023671] ? __ia32_sys_exit+0x50/0x50 [ 166.027718] ? _raw_spin_unlock_irq+0x27/0x70 [ 166.032206] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 166.037216] get_signal+0x886/0x1960 [ 166.040921] ? ptrace_notify+0x130/0x130 [ 166.044970] ? graph_lock+0x170/0x170 [ 166.048756] ? rcu_is_watching+0x85/0x140 [ 166.052900] ? mntput_no_expire+0x186/0xba0 [ 166.057208] ? dentry_kill+0xce/0x5a0 [ 166.060993] ? mnt_get_count+0x150/0x150 [ 166.065047] ? find_held_lock+0x36/0x1c0 [ 166.069096] do_signal+0x98/0x2040 [ 166.072633] ? lock_downgrade+0x8e0/0x8e0 [ 166.076774] ? setup_sigcontext+0x7d0/0x7d0 [ 166.081085] ? kasan_check_read+0x11/0x20 [ 166.085224] ? do_raw_spin_unlock+0x9e/0x2e0 [ 166.089618] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 166.094187] ? _raw_spin_unlock_irq+0x27/0x70 [ 166.098676] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 166.103688] ? exit_to_usermode_loop+0x87/0x310 [ 166.108347] exit_to_usermode_loop+0x28a/0x310 [ 166.112915] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 166.117741] ? fput+0x130/0x1a0 [ 166.121006] ? do_syscall_64+0x92/0x800 [ 166.124976] do_syscall_64+0x6ac/0x800 [ 166.128853] ? finish_task_switch+0x1ca/0x810 [ 166.133342] ? syscall_return_slowpath+0x5c0/0x5c0 [ 166.138259] ? syscall_return_slowpath+0x30f/0x5c0 [ 166.143175] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 166.148534] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 166.153371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.158547] RIP: 0033:0x455389 [ 166.161726] RSP: 002b:00007f21a4076ce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 166.169418] RAX: 0000000000000000 RBX: 000000000072bec8 RCX: 0000000000455389 [ 166.176681] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000072bec8 [ 166.183943] RBP: 000000000072bec8 R08: 0000000000000000 R09: 000000000072bea0 [ 166.191196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 166.198447] R13: 00007ffff36164ef R14: 00007f21a40779c0 R15: 0000000000000000 [ 166.205717] ================================================================== [ 166.213061] Disabling lock debugging due to kernel taint [ 166.219344] Kernel panic - not syncing: panic_on_warn set ... [ 166.219344] [ 166.226743] CPU: 1 PID: 12495 Comm: syz-executor3 Tainted: G B 4.17.0-rc1+ #10 [ 166.235396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.244730] Call Trace: [ 166.247306] dump_stack+0x1b9/0x294 [ 166.250921] ? dump_stack_print_info.cold.2+0x52/0x52 [ 166.256098] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 166.260851] ? refcount_add_not_zero+0x300/0x320 [ 166.265590] panic+0x22f/0x4de [ 166.268765] ? add_taint.cold.5+0x16/0x16 [ 166.272901] ? do_raw_spin_unlock+0x9e/0x2e0 [ 166.277296] ? do_raw_spin_unlock+0x9e/0x2e0 [ 166.281691] ? refcount_inc_not_zero+0x8f/0x2d0 [ 166.286345] kasan_end_report+0x47/0x4f [ 166.290306] kasan_report.cold.7+0x76/0x2fe [ 166.294622] check_memory_region+0x13e/0x1b0 [ 166.299022] kasan_check_read+0x11/0x20 [ 166.302979] refcount_inc_not_zero+0x8f/0x2d0 [ 166.307462] ? refcount_add_not_zero+0x320/0x320 [ 166.312207] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 166.317213] ? lock_sock_nested+0x9f/0x120 [ 166.321435] refcount_inc+0x15/0x70 [ 166.325049] llc_ui_release+0xba/0x2b0 [ 166.328923] ? fsnotify_first_mark+0x330/0x330 [ 166.333491] sock_release+0x96/0x1b0 [ 166.337190] ? sock_alloc_file+0x4e0/0x4e0 [ 166.341407] sock_close+0x16/0x20 [ 166.344842] __fput+0x34d/0x890 [ 166.348110] ? fput+0x1a0/0x1a0 [ 166.351382] ? _raw_spin_unlock_irq+0x27/0x70 [ 166.355863] ____fput+0x15/0x20 [ 166.359126] task_work_run+0x1e4/0x290 [ 166.362998] ? task_work_cancel+0x240/0x240 [ 166.367309] ? switch_task_namespaces+0xbd/0xd0 [ 166.371962] do_exit+0x1aee/0x2730 [ 166.375491] ? mm_update_next_owner+0x980/0x980 [ 166.380146] ? print_usage_bug+0xc0/0xc0 [ 166.384191] ? check_same_owner+0x320/0x320 [ 166.388498] ? do_raw_spin_unlock+0x9e/0x2e0 [ 166.392892] ? rcu_note_context_switch+0x710/0x710 [ 166.397803] ? lock_acquire+0x1dc/0x520 [ 166.401766] ? __might_sleep+0x95/0x190 [ 166.405735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 166.411258] ? __lock_acquire+0x7f5/0x5140 [ 166.415485] ? kasan_check_write+0x14/0x20 [ 166.419703] ? do_raw_spin_lock+0xc1/0x200 [ 166.423926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 166.429451] ? debug_check_no_locks_freed+0x310/0x310 [ 166.434630] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 166.439813] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 166.445341] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 166.450435] ? futex_wait+0x5c1/0x9f0 [ 166.454224] ? futex_wait_setup+0x400/0x400 [ 166.458529] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 166.463707] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 166.469226] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 166.474315] ? futex_wake+0x2f6/0x750 [ 166.478100] ? graph_lock+0x170/0x170 [ 166.481890] ? memset+0x31/0x40 [ 166.485156] ? find_held_lock+0x36/0x1c0 [ 166.489206] ? lock_downgrade+0x8e0/0x8e0 [ 166.493345] do_group_exit+0x16f/0x430 [ 166.497220] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 166.501787] ? __ia32_sys_exit+0x50/0x50 [ 166.505835] ? _raw_spin_unlock_irq+0x27/0x70 [ 166.510317] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 166.515323] get_signal+0x886/0x1960 [ 166.519031] ? ptrace_notify+0x130/0x130 [ 166.523077] ? graph_lock+0x170/0x170 [ 166.526869] ? rcu_is_watching+0x85/0x140 [ 166.531004] ? mntput_no_expire+0x186/0xba0 [ 166.535314] ? dentry_kill+0xce/0x5a0 [ 166.539096] ? mnt_get_count+0x150/0x150 [ 166.543145] ? find_held_lock+0x36/0x1c0 [ 166.547194] do_signal+0x98/0x2040 [ 166.550719] ? lock_downgrade+0x8e0/0x8e0 [ 166.554852] ? setup_sigcontext+0x7d0/0x7d0 [ 166.559157] ? kasan_check_read+0x11/0x20 [ 166.563289] ? do_raw_spin_unlock+0x9e/0x2e0 [ 166.567680] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 166.572251] ? _raw_spin_unlock_irq+0x27/0x70 [ 166.576730] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 166.581738] ? exit_to_usermode_loop+0x87/0x310 [ 166.586393] exit_to_usermode_loop+0x28a/0x310 [ 166.590959] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 166.595787] ? fput+0x130/0x1a0 [ 166.599048] ? do_syscall_64+0x92/0x800 [ 166.603015] do_syscall_64+0x6ac/0x800 [ 166.606887] ? finish_task_switch+0x1ca/0x810 [ 166.611368] ? syscall_return_slowpath+0x5c0/0x5c0 [ 166.616280] ? syscall_return_slowpath+0x30f/0x5c0 [ 166.621193] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 166.626542] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 166.631369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.636540] RIP: 0033:0x455389 [ 166.639710] RSP: 002b:00007f21a4076ce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 166.647403] RAX: 0000000000000000 RBX: 000000000072bec8 RCX: 0000000000455389 [ 166.654663] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000072bec8 [ 166.661915] RBP: 000000000072bec8 R08: 0000000000000000 R09: 000000000072bea0 [ 166.669166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 166.676419] R13: 00007ffff36164ef R14: 00007f21a40779c0 R15: 0000000000000000 [ 166.684109] Dumping ftrace buffer: [ 166.687628] (ftrace buffer empty) [ 166.691313] Kernel Offset: disabled [ 166.694924] Rebooting in 86400 seconds..