Warning: Permanently added '10.128.0.5' (ECDSA) to the list of known hosts. 2019/10/01 00:04:31 fuzzer started [ 48.125234] kauditd_printk_skb: 2 callbacks suppressed [ 48.125249] audit: type=1400 audit(1569888271.129:36): avc: denied { map } for pid=7639 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/01 00:04:32 dialing manager at 10.128.0.105:38839 2019/10/01 00:04:32 syscalls: 2489 2019/10/01 00:04:32 code coverage: enabled 2019/10/01 00:04:32 comparison tracing: enabled 2019/10/01 00:04:32 extra coverage: extra coverage is not supported by the kernel 2019/10/01 00:04:32 setuid sandbox: enabled 2019/10/01 00:04:32 namespace sandbox: enabled 2019/10/01 00:04:32 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/01 00:04:32 fault injection: enabled 2019/10/01 00:04:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/01 00:04:32 net packet injection: enabled 2019/10/01 00:04:32 net device setup: enabled 00:07:22 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 219.524283] audit: type=1400 audit(1569888442.529:37): avc: denied { map } for pid=7657 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14932 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 219.611270] IPVS: ftp: loaded support on port[0] = 21 00:07:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x7fffffe) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffffffffffe3c, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 219.717918] chnl_net:caif_netlink_parms(): no params data found [ 219.797253] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.820827] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.828574] device bridge_slave_0 entered promiscuous mode [ 219.853892] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.860358] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.867780] device bridge_slave_1 entered promiscuous mode [ 219.889079] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.899347] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.912904] IPVS: ftp: loaded support on port[0] = 21 [ 219.937143] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.945166] team0: Port device team_slave_0 added 00:07:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4f, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x13}], 0x1, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup3(r1, r0, 0x0) [ 219.952700] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.960213] team0: Port device team_slave_1 added [ 219.966382] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.977973] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.083507] device hsr_slave_0 entered promiscuous mode [ 220.100923] device hsr_slave_1 entered promiscuous mode 00:07:23 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) write$binfmt_elf64(r3, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="2f58437f39c8d8d713ae2ae6947ca85cc3cfd56e3620de35e8984c27fedef598912c8caabfea8b2e4d0c7f2a9a19c46145815d486a5766b0e5aae5b6be6c3e876756056fe96350895584b73b4dd8f916d0c13538784f077c0e5d9f44c25d391e4282b463c7ccbb924a011f95d889f3cd737a3287c6f288043cf887404e"], 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') readv(r5, &(0x7f00000021c0)=[{&(0x7f0000000140)=""/79, 0x432}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/239}) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r6 = open(0x0, 0x0, 0x0) fcntl$setstatus(r6, 0x4, 0x40400) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x30, r0, 0x0) r7 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, 0x0, &(0x7f0000000000)) r8 = syz_open_procfs(0x0, &(0x7f0000001380)='stack\x00') readv(r8, &(0x7f00000021c0)=[{&(0x7f0000000140)=""/79, 0x432}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2) ioctl$PPPIOCGDEBUG(r8, 0x80047441, &(0x7f0000000140)) r9 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000481000)=""/128, 0x80) read(0xffffffffffffffff, &(0x7f0000481000)=""/128, 0x1fa) ioctl$FS_IOC_GETFSMAP(r9, 0xc0c0583b, &(0x7f0000001200)={0x0, 0x0, 0x3, 0x0, [], [{0x3720000, 0x9, 0x5, 0x0, 0x35, 0x6}, {0x3c, 0x400, 0x101, 0x2, 0x7f, 0x3984}], [[], [], []]}) setsockopt$inet6_opts(r4, 0x29, 0x36, &(0x7f00000011c0)=@routing={0x6c, 0x2, 0x2, 0x73, 0x0, [@rand_addr="72600ca92b11c1d01898b7fd6b4aeb3c"]}, 0x18) [ 220.152317] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 220.168610] IPVS: ftp: loaded support on port[0] = 21 [ 220.182259] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 220.265371] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.271970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.278981] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.285414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.304564] chnl_net:caif_netlink_parms(): no params data found [ 220.374143] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.380663] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.389109] device bridge_slave_0 entered promiscuous mode [ 220.397138] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.405596] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.413195] device bridge_slave_1 entered promiscuous mode 00:07:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000107], [0xc1]}) [ 220.434942] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.457211] IPVS: ftp: loaded support on port[0] = 21 [ 220.464235] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.542144] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.549650] team0: Port device team_slave_0 added [ 220.618044] chnl_net:caif_netlink_parms(): no params data found [ 220.630216] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.638562] team0: Port device team_slave_1 added [ 220.646164] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.679926] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 220.687630] IPVS: ftp: loaded support on port[0] = 21 [ 220.688531] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.707397] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.748520] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.767057] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.774893] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 220.797743] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 00:07:23 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) [ 220.863546] device hsr_slave_0 entered promiscuous mode [ 220.900928] device hsr_slave_1 entered promiscuous mode [ 220.962070] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 220.969017] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 220.992029] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.008981] IPVS: ftp: loaded support on port[0] = 21 [ 221.012001] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.023295] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.030104] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.037799] device bridge_slave_0 entered promiscuous mode [ 221.044615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.051772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.099921] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.107423] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.115300] device bridge_slave_1 entered promiscuous mode [ 221.138808] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.157633] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 221.163982] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.172857] chnl_net:caif_netlink_parms(): no params data found [ 221.181772] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.202477] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.214345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.239551] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.247252] team0: Port device team_slave_0 added [ 221.255619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.263749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.271615] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.277959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.284927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.293430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.301279] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.307633] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.335740] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.353536] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.361514] team0: Port device team_slave_1 added [ 221.367038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.403719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.417944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.425238] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 221.432685] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.439039] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.446100] device bridge_slave_0 entered promiscuous mode [ 221.460034] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.466537] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.473805] device bridge_slave_1 entered promiscuous mode [ 221.503232] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.521319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.531125] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 221.539763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.567842] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.622366] device hsr_slave_0 entered promiscuous mode [ 221.660900] device hsr_slave_1 entered promiscuous mode [ 221.700806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.708663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.716907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.724713] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.732733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.740402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 221.752162] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.762884] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.769084] chnl_net:caif_netlink_parms(): no params data found [ 221.784186] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.793639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.801495] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.809049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.816400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.824460] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.834426] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 221.842053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.849608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.865151] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.879440] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 221.886180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.893565] chnl_net:caif_netlink_parms(): no params data found [ 221.910355] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 221.916881] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.925915] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.945225] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.959469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.967646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.975518] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.982089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.989411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.999088] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.007601] team0: Port device team_slave_0 added [ 222.016444] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.024952] team0: Port device team_slave_1 added [ 222.033315] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.054902] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 222.067020] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.079723] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.086353] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.094075] device bridge_slave_0 entered promiscuous mode [ 222.106224] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.113789] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.121791] device bridge_slave_1 entered promiscuous mode [ 222.128652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.159214] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.166910] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.176617] device bridge_slave_0 entered promiscuous mode [ 222.188553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.196746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.204695] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.211074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.220012] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.263532] device hsr_slave_0 entered promiscuous mode [ 222.321050] device hsr_slave_1 entered promiscuous mode [ 222.362860] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.369250] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.376965] device bridge_slave_1 entered promiscuous mode [ 222.402016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.412706] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.422255] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.434842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.442896] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 222.450822] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 222.460139] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.469519] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.478298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.488290] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.497685] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.510139] audit: type=1400 audit(1569888445.509:38): avc: denied { associate } for pid=7658 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 222.532687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.545860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.568427] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.577185] team0: Port device team_slave_0 added [ 222.583476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.591265] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.598600] team0: Port device team_slave_1 added [ 222.613901] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.633648] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.653337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.666760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.677786] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 222.689693] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.696715] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.713969] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.721655] team0: Port device team_slave_0 added [ 222.727678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.735652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.748607] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 222.757366] hrtimer: interrupt took 29878 ns [ 222.829129] device hsr_slave_0 entered promiscuous mode [ 222.871063] device hsr_slave_1 entered promiscuous mode [ 222.911362] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.918800] team0: Port device team_slave_1 added [ 222.925423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.933292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.949382] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 222.955935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.966303] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 222.973360] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.981232] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.994477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.006792] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.014251] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 223.036064] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.072853] device hsr_slave_0 entered promiscuous mode [ 223.110897] device hsr_slave_1 entered promiscuous mode [ 223.165189] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.175312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.182620] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 223.189854] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 223.203263] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.212417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.219399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.229135] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 223.235948] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.256379] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.269125] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.279205] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.302925] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.316760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.325639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.335977] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.342426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.349785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.361632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.369544] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.378932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.392031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.399881] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.406541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.413571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.420676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.439505] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.464128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 00:07:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="540000002c000107000000000000af395fbcdee2", @ANYRES32=r1, @ANYBLOB="0800000000000000060000000c0001006367726f757000002400020014000300080001000000000008000100000000000c0003000800010000000000"], 0x54}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) [ 223.492085] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 223.498307] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.533020] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.564058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 00:07:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x3500, 0x0, 0x0, 0x3ff}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) [ 223.585077] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.594930] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.606468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.621776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 00:07:26 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)={[{@metacopy_off='metacopy=off'}]}) [ 223.635599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.651303] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.657690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.667637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.675559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.686068] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.706331] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.717203] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.727585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:07:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) [ 223.745979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.768620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.779159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.787357] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.793819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.795803] overlayfs: missing 'lowerdir' [ 223.805634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.815216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.825383] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.836452] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 223.842658] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.852868] overlayfs: missing 'lowerdir' [ 223.859457] sp0: Synchronizing with TNC [ 223.859939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.876216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.884476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.892640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.900826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.910139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.919611] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.928296] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 00:07:26 executing program 0: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f00003b3000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000016c0)='smaps_rollup\x00') readv(r0, &(0x7f0000001700)=[{&(0x7f0000001500)=""/179, 0xb3}], 0x1) [ 223.943938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.978432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.995672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.018704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.039841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.065791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 00:07:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) pipe(0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg$key(r1, &(0x7f0000000000)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0200000007002c00001a000017a667beda8e44a6"], 0x2a1}}, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000880)) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='./file0\x00') write$uinput_user_dev(r0, &(0x7f0000000400)={'syz0\x00', {0x0, 0x7, 0x0, 0x2}, 0x0, [0x0, 0x917, 0xb951, 0x9d7, 0x400, 0x3f, 0x200, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x9, 0x8, 0x2, 0x7, 0x6, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7f, 0x0, 0x0, 0x7fffffff, 0xdc, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x102, 0x5, 0x3, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x7, 0x67, 0x71da0000, 0x0, 0x0, 0x5f0ecdc6, 0x3], [0x3, 0x8515, 0x547cc5e2, 0xc, 0x0, 0x0, 0x401, 0x7, 0x8, 0x100000000, 0x0, 0x8c5e, 0x0, 0x80000000, 0x8000, 0x0, 0x0, 0x2, 0x94, 0x987, 0x7, 0x0, 0x0, 0x0, 0x808000000, 0x4, 0x0, 0x9, 0x0, 0x0, 0x3, 0x73374fc8, 0x12db153e, 0x5, 0x400, 0x0, 0x0, 0x6, 0x0, 0x1, 0x5e, 0x5, 0x753ca947, 0x8, 0x0, 0x40000036, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x7, 0x10000, 0x0, 0x5, 0x3ff, 0xfff, 0x0, 0x5, 0x1], [0x4, 0x7, 0x0, 0x4, 0x0, 0x102, 0xfffffffffffffff7, 0x1, 0x400, 0x7, 0x5, 0x0, 0x0, 0x101, 0x8001, 0x1000, 0x40, 0xf2d8, 0x100, 0x0, 0x0, 0x0, 0x3, 0x0, 0x101, 0x9, 0x8, 0x200, 0x9, 0x0, 0x0, 0x7fffffff, 0x6, 0x4, 0x0, 0x7, 0x9, 0x9, 0x0, 0x3, 0xe8f594b, 0x4, 0x0, 0xa13, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x3f, 0xffffffffffff1252, 0xfff, 0x101, 0xffffffffffffffff, 0x0, 0x2, 0x400000, 0x0, 0x353, 0x4, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x80000001], [0x1cfd, 0x0, 0x3, 0xffffffffffff8bbf, 0x0, 0x0, 0x8, 0x0, 0x6, 0x7, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe946, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x8, 0x1, 0x0, 0x80000001, 0x4da2, 0x0, 0x57732e75, 0x0, 0x3f, 0x8000, 0xff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5309]}, 0x45c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) getresgid(&(0x7f0000000340), 0x0, &(0x7f0000000900)) getresgid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./file0\x00', 0x0) getgroups(0x3, &(0x7f0000000ac0)=[0xee00, 0x0, 0x0]) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x103d05, 0x0) write$P9_RWRITE(r6, 0x0, 0x0) fstat(r5, &(0x7f00000003c0)) listen(r6, 0x7ff) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x8000, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$null(0xffffffffffffff9c, 0x0, 0x103d05, 0x0) write$P9_RWRITE(r7, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000003c0)) getgid() r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) pivot_root(0x0, 0x0) [ 224.092106] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.098511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.121073] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.130460] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.177513] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 224.188498] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 00:07:27 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x60}, 0xc) [ 224.218217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.227207] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.241638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.249586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 00:07:27 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f0000001900)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) getsockopt$inet6_mreq(r1, 0x29, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x0, r5}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r6, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) r7 = syz_open_procfs(0x0, 0x0) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r8, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r9 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={0x0, 0x0, &(0x7f0000002200)={0x0}, 0x1, 0x0, 0x0, 0x2000}, 0x0) syz_genetlink_get_family_id$team(0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) r10 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r11, 0x0, 0xdd) getpeername$packet(r11, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x0, r12}) r13 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) r14 = syz_genetlink_get_family_id$team(0x0) r15 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r15, 0xffffffffffffffff, 0x0, 0x0) getpeername$packet(r15, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002200)={&(0x7f0000000940)=ANY=[@ANYBLOB="cc040000", @ANYRES16=r14, @ANYBLOB="00082cbd7000fedbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r16, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040009000000080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080001", @ANYRES32=0x0, @ANYBLOB="f00002003c00010024000100757365725f6c696e6b75705f656e61626c6564000000000000000000000000002be80300060000000400040008", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004001f00000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000600000008000100", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="380102003c00010024000100757365725f6c696e6b75700000000000000000000000000000000000000000000800", @ANYRES32=0x0], 0x15}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r17, &(0x7f0000000000), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) r18 = syz_open_procfs(0x0, 0x0) getpeername$packet(r18, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r19 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r19, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) syz_genetlink_get_family_id$team(0x0) r20 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r20, 0xffffffffffffffff, 0x0, 0xdd) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') socket$inet(0x2, 0x1, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000000000), 0xc, &(0x7f0000002200)={&(0x7f0000000940)={0x2d0, 0x0, 0x800, 0x0, 0x0, {}, [{{0x8}, {0x17c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0xb0, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x78, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x2000}, 0x4000000) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) accept$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002600)=0x14) r21 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r21, r21, 0x0, 0xdd) getpeername$packet(r21, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r22 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r22, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40) [ 224.294898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.331745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.339848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.370180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.397689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.409988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.418408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.428454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.451176] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.457570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.467243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.477145] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 224.487110] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 224.494573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.504873] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.517954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.526216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.535709] audit: type=1400 audit(1569888447.539:39): avc: denied { create } for pid=7730 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 224.562325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.563581] audit: type=1400 audit(1569888447.539:40): avc: denied { write } for pid=7730 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 224.592538] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 224.595119] audit: type=1400 audit(1569888447.549:41): avc: denied { read } for pid=7730 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 224.599423] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.636705] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.646757] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 224.661867] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 224.668610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.677593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.685668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.697698] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.708626] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.721616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.735319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.744887] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.751336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.758821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.767419] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.777693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.786476] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 224.793354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.803557] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.814059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.821281] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.828245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.836473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.844292] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.850696] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.858109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.866260] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.876272] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.884691] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.893144] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 224.908064] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 224.914824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.922975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.930476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.940172] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.949642] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 224.963492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.973431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.982516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.993048] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.002538] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.010755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.025140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.039542] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 225.067893] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 225.079908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.093359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.106778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 225.115734] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 225.126109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.135275] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.147640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 225.157993] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.165813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.174942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.192336] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 225.199381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 225.224349] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 225.269980] 8021q: adding VLAN 0 to HW filter on device batadv0 00:07:28 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 225.399715] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 00:07:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000098], [0xc1]}) 00:07:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000073, 0x3], [0xc1]}) 00:07:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="4000000010000132b7070f67906a900000000000", @ANYRES32=r2, @ANYBLOB="000000000000000020001200140001006272696467655f736c097665000000000800050004001800"], 0x40}}, 0x0) 00:07:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newtfilter={0x3c, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0xc, 0x2, [@TCA_FLOW_KEYS={0x8, 0x1, 0x699a}]}}]}, 0x3c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:07:29 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000040)) 00:07:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x13) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x5, &(0x7f00000000c0)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x18}, [@map_val={0x18, 0x0, 0x2, 0x0, r0}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:07:29 executing program 3: syz_genetlink_get_family_id$fou(0x0) 00:07:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x6) [ 226.200165] audit: type=1400 audit(1569888449.199:42): avc: denied { map_create } for pid=7810 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:07:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='b\n\x00', 0x7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x5011, r0, 0x0) [ 226.315133] audit: type=1400 audit(1569888449.199:43): avc: denied { map_read map_write } for pid=7810 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:07:29 executing program 5: socket$kcm(0x2c, 0x3, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000040)='&@[\x00') socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:07:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="600000002c00010700"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000060000000c000100666c6f77000002002c000b0008000100c8e90000200002001c04010000000100010000000000000000000000000000000000000020c1ba02"], 0x60}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:07:29 executing program 3: syz_open_dev$adsp(&(0x7f0000000a00)='/dev/adsp#\x00', 0xffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) socket$inet(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x6, 0xe, 0x0, 0xa8) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000900)='/dev/snapshot\x00', 0x101041, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r3, &(0x7f0000000080)=0x20000000000084, 0x8) write(r3, 0x0, 0x0) sendfile(r3, r3, &(0x7f00000000c0), 0xfeff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000940)={r2, @dev={0xac, 0x14, 0x14, 0x1e}, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) r5 = socket(0x0, 0x3, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4200040}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYBLOB="010029bd70000000000002ffe80214000101080002000153"], 0x2}}, 0x0) syz_open_dev$audion(&(0x7f0000000800)='/dev/audio#\x00', 0x5, 0x100) [ 226.452910] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 226.471017] protocol 88fb is buggy, dev hsr_slave_0 [ 226.476320] protocol 88fb is buggy, dev hsr_slave_1 00:07:29 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 226.480684] audit: type=1400 audit(1569888449.439:44): avc: denied { map } for pid=7828 comm="syz-executor.1" path=2F6D656D66643A620A202864656C6574656429 dev="hugetlbfs" ino=27980 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 226.527277] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 00:07:29 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x73) connect(r0, &(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80) [ 226.558029] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 226.591410] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 00:07:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, r1, r2) 00:07:29 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)=ANY=[], &(0x7f000095dffc)) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='status\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000400)={0x0, 0x2000}) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000003c0)={0x2, 'netdevsim0\x00', 0x1}, 0x18) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r0, r2, 0x0, 0x102000002) 00:07:29 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, 0x0) pipe(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg$key(r0, &(0x7f0000000000)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0200000007002c00001a000017a667beda8e44a6"], 0x2a1}}, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000880)) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz0\x00', {0x0, 0x7, 0x0, 0x2}, 0x0, [0x0, 0x0, 0xb951, 0x9d7, 0x400, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8, 0x2, 0x7, 0x6, 0x4, 0x0, 0x0, 0x0, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7f, 0x0, 0x0, 0x7fffffff, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x102, 0x5, 0x3, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x7, 0x67, 0x71da0000, 0x0, 0x0, 0x0, 0x3], [0x3, 0x8515, 0x547cc5e2, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x94, 0x987, 0x7, 0x0, 0x0, 0x0, 0x808000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73374fc8, 0x12db153e, 0x5, 0x400, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x5, 0x0, 0x8, 0x0, 0x40000036, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x3ff, 0xfff, 0x0, 0x5, 0x1], [0x0, 0x7, 0x0, 0x4, 0x0, 0x102, 0xfffffffffffffff7, 0x1, 0x400, 0x7, 0x0, 0x0, 0xffff, 0x101, 0x0, 0x1000, 0x40, 0xf2d8, 0x100, 0x0, 0x0, 0x0, 0x3, 0x0, 0x101, 0x9, 0x8, 0x200, 0x9, 0x0, 0x0, 0x7fffffff, 0x0, 0x4, 0x0, 0x0, 0x9, 0x9, 0x0, 0x3, 0x0, 0x4, 0x0, 0xa13, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x3f, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x400000, 0x0, 0x353, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000001], [0x1cfd, 0x0, 0x3, 0xffffffffffff8bbf, 0x0, 0x0, 0x8, 0x0, 0x6, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe946, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x8, 0x1, 0x0, 0x80000001, 0x0, 0x0, 0x57732e75, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9c7, 0x0, 0x0, 0x0, 0x5309]}, 0x45c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) getresgid(&(0x7f0000000340), 0x0, &(0x7f0000000900)) stat(&(0x7f0000000a00)='./file0\x00', 0x0) getgroups(0x1, &(0x7f0000000ac0)=[0x0]) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) fstat(r2, &(0x7f00000003c0)) listen(0xffffffffffffffff, 0x7ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000003c0)) getgid() r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES32=0x0], 0x1}}, 0x0) pivot_root(0x0, 0x0) 00:07:29 executing program 5: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f00000084c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000008540)=0x80) close(r1) accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303}, "19722a41bfe59636", "dfcff4250af3166d02f3163b494be1ab", "27688993", "689e1b54a027a3d2"}, 0x28) setsockopt$inet_mreq(r3, 0x0, 0x24, 0x0, 0x4d76f4ec4599dac0) 00:07:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x88240, 0x0) 00:07:29 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) lstat(&(0x7f0000000f00)='./file0\x00', 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x102000002) 00:07:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:07:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) [ 227.203397] syz-executor.1 (7863) used greatest stack depth: 22160 bytes left 00:07:30 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x0, 0x9, 0x8, 0xdb83, 0x8000}) syz_open_pts(0xffffffffffffffff, 0x1) r1 = creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6900) ftruncate(0xffffffffffffffff, 0x800) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8001) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40400, 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, &(0x7f0000000000)) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR64, @ANYRES16=r4], @ANYRES32, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESOCT]], @ANYRESHEX, @ANYRES16, @ANYRES16=r5, @ANYRES64=r3], 0x6}, 0x1, 0x0, 0x0, 0x100c0}, 0x4000000) r6 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r6, 0x0) ioctl$RTC_WIE_OFF(r6, 0x7010) ioctl$UI_SET_ABSBIT(r6, 0x40045567, 0x3) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000180)) r7 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x4000, 0x0) fcntl$setlease(r7, 0x400, 0x0) 00:07:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) 00:07:30 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x80003, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000002c008151e00f80ec0400b904014865160b00014101410000000f00170000001f1500cd5edc00000000b4", 0x2e}], 0x1}, 0x0) 00:07:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:30 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x0, 0x9, 0x8, 0xdb83, 0x8000}) syz_open_pts(0xffffffffffffffff, 0x1) r1 = creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6900) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8001) openat$ptmx(0xffffffffffffff9c, 0x0, 0x40400, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, &(0x7f0000000000)) pipe2(&(0x7f00000004c0), 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r3, 0x0) ioctl$RTC_WIE_OFF(r3, 0x7010) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000180)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) fcntl$setlease(r4, 0x400, 0x0) 00:07:30 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 227.534003] Enabling of bearer <Ü> rejected, illegal name [ 227.543860] Enabling of bearer <Ü> rejected, illegal name 00:07:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x86842, 0x0) r3 = socket(0x0, 0x80000, 0x9) socket(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@deltclass={0x24, 0x29, 0xdf71b8bfc55a1297, 0x0, 0x25dfdbfb, {0x0, r4, {0xa, 0xa}, {0xf, 0xfff8}}}, 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x2008001) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r5 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576b31e5fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r2, r5, 0x0, 0x10000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCRTC(r6, 0xc06864a1, &(0x7f0000000180)={&(0x7f00000000c0)=[0x0, 0x0, 0x81, 0x0, 0x1, 0x0], 0x6, 0x5, 0x7, 0x0, 0x0, 0x0, {0xfff, 0x3, 0x40, 0x0, 0x4, 0x9, 0x81, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x3f, 0x9, "8cfd79d2cb0adbc36b56b8688cb162a68b4d34ccd9b01c645e238b76bc8e347c"}}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 227.623013] audit: type=1804 audit(1569888450.629:45): pid=7924 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir134261732/syzkaller.qGMibt/4/bus" dev="sda1" ino=16557 res=1 00:07:30 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 227.754233] audit: type=1804 audit(1569888450.659:46): pid=7928 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir330197719/syzkaller.682afh/5/bus" dev="sda1" ino=16561 res=1 00:07:30 executing program 1: syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x0, 0x9, 0x8, 0xdb83, 0x8000}) syz_open_pts(0xffffffffffffffff, 0x1) r1 = creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6900) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8001) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40400, 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, 0x0) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x4000) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYRES32=r5, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYPTR64, @ANYRES16=r4], @ANYRES32, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESOCT]], @ANYRESHEX, @ANYRES16, @ANYRES16=r6, @ANYRES64=r3], 0x6}, 0x1, 0x0, 0x0, 0x100c0}, 0x0) r7 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r7, 0x0) ioctl$RTC_WIE_OFF(r7, 0x7010) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000180)) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setlease(r8, 0x400, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x7, 0x0) 00:07:30 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 227.931641] audit: type=1804 audit(1569888450.799:47): pid=7945 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir134261732/syzkaller.qGMibt/4/bus" dev="sda1" ino=16557 res=1 00:07:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x80003, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000002c008151e00f80ec0400b904014865160b00014101410000000f00170000001f1500cd5edc00000000b4", 0x2e}], 0x1}, 0x0) [ 228.111375] audit: type=1804 audit(1569888450.819:49): pid=7937 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir330197719/syzkaller.682afh/5/bus" dev="sda1" ino=16561 res=1 00:07:31 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 228.169889] Enabling of bearer <Ü> rejected, illegal name 00:07:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0x0) fcntl$addseals(r1, 0x409, 0x8) 00:07:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 00:07:31 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:31 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1400000001000000d8e43700f18105005211fd2d1ec5500b16de8972787cbb958f57edf7dd98399c59d07549a20095d3df0bf6aeb283c70a73c817c13db2fc7f68e3649cf00e022fa429b6fd6ec85d16dbd4253eb652e37cbecdf24815e0a525f7f7af05d1d499a72a0c85770f988b8615cfcce56dcd1fc93201813b2194db166b10690dff2971cb67a8fcbd92353dfd3c9f8f84789b959ded1499960000000009570fb1860f00001a938fd4d7e9a8f2247ab459fe0eb025e8b9b1ac24041d9beea795474a5b5d5a2cc4901fc5be18fead50920d33653dcd82a589e96d73d6"], 0xcb}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000600)={r1}) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0xffffffffffffffff, r2, 0x0, 0x6, &(0x7f0000000140)='bcsh0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r2, 0x0, 0x7, &(0x7f0000000540)='system\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r4, r2, 0x0, 0x7, &(0x7f0000000500)='system\x00', r5}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x7, 0x300) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r2, 0x0, 0x7, &(0x7f0000000240)='system\x00'}, 0x30) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x9ca, 0x43, 0x4, 0x0, 0x1, 0x20002, 0xe, 0x2, 0x7, 0x3, 0x9, 0x8, 0x6, 0x6, 0x58, 0xfffffffffffffff9, 0x0, 0x6, 0x8000, 0x1ff, 0x1000, 0x7, 0x3f, 0x0, 0x80, 0x0, 0xfffffffffffff801, 0xa1a, 0x0, 0xffffffffffffffe1, 0x1, 0xa11, 0x7, 0x0, 0x401, 0x0, 0xec36, 0x2, @perf_bp={&(0x7f00000002c0), 0x4}, 0x100, 0x80000, 0x7, 0xf, 0xffffffffffffff8c, 0x86, 0x9}, r6, 0xfffffffffffffffd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='io.stat\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r7, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r8 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r8, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1302}}, 0x80, 0x0}, 0x0) recvmsg(r8, &(0x7f0000002500)={0x0, 0xffffffffffffff2f, 0x0}, 0x22) recvmsg(r8, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) close(0xffffffffffffffff) 00:07:31 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x86842, 0x0) r3 = socket(0x0, 0x80000, 0x9) socket(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@deltclass={0x24, 0x29, 0xdf71b8bfc55a1297, 0x0, 0x25dfdbfb, {0x0, r4, {0xa, 0xa}, {0xf, 0xfff8}}}, 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x2008001) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r5 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000000800)="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", 0x600) sendfile(r2, r5, 0x0, 0x10000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCRTC(r6, 0xc06864a1, &(0x7f0000000180)={&(0x7f00000000c0)=[0x0, 0x0, 0x81, 0x0, 0x1, 0x0], 0x6, 0x5, 0x7, 0x0, 0x0, 0x0, {0xfff, 0x3, 0x40, 0x0, 0x4, 0x9, 0x81, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x3f, 0x9, "8cfd79d2cb0adbc36b56b8688cb162a68b4d34ccd9b01c645e238b76bc8e347c"}}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 228.859785] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 00:07:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000002600110c00"/20, @ANYRES32=r1, @ANYBLOB="00000000f1ff066d07f40e8bbe0f0800"], 0x28}}, 0x0) 00:07:32 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 229.174392] device 0 entered promiscuous mode 00:07:32 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:32 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1400000001000000d8e43700f18105005211fd2d1ec5500b16de8972787cbb958f57edf7dd98399c59d07549a20095d3df0bf6aeb283c70a73c817c13db2fc7f68e3649cf00e022fa429b6fd6ec85d16dbd4253eb652e37cbecdf24815e0a525f7f7af05d1d499a72a0c85770f988b8615cfcce56dcd1fc93201813b2194db166b10690dff2971cb67a8fcbd92353dfd3c9f8f84789b959ded1499960000000009570fb1860f00001a938fd4d7e9a8f2247ab459fe0eb025e8b9b1ac24041d9beea795474a5b5d5a2cc4901fc5be18fead50920d33653dcd82a589e96d73d6"], 0xcb}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000600)={r1}) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0xffffffffffffffff, r2, 0x0, 0x6, &(0x7f0000000140)='bcsh0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r2, 0x0, 0x7, &(0x7f0000000540)='system\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r4, r2, 0x0, 0x7, &(0x7f0000000500)='system\x00', r5}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x7, 0x300) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r2, 0x0, 0x7, &(0x7f0000000240)='system\x00'}, 0x30) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x9ca, 0x43, 0x4, 0x0, 0x1, 0x20002, 0xe, 0x2, 0x7, 0x3, 0x9, 0x8, 0x6, 0x6, 0x58, 0xfffffffffffffff9, 0x0, 0x6, 0x8000, 0x1ff, 0x1000, 0x7, 0x3f, 0x0, 0x80, 0x0, 0xfffffffffffff801, 0xa1a, 0x0, 0xffffffffffffffe1, 0x1, 0xa11, 0x7, 0x0, 0x401, 0x0, 0xec36, 0x2, @perf_bp={&(0x7f00000002c0), 0x4}, 0x100, 0x80000, 0x7, 0xf, 0xffffffffffffff8c, 0x86, 0x9}, r6, 0xfffffffffffffffd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='io.stat\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r7, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r8 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r8, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1302}}, 0x80, 0x0}, 0x0) recvmsg(r8, &(0x7f0000002500)={0x0, 0xffffffffffffff2f, 0x0}, 0x22) recvmsg(r8, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) close(0xffffffffffffffff) [ 229.277027] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 229.396963] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 229.467006] device 1 entered promiscuous mode 00:07:32 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:07:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=@newtfilter={0x30, 0x2c, 0x701, 0x0, 0x0, {0x0, r2, {}, {}, {0x6}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x332, 0x0) 00:07:32 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newtfilter={0x54, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_rsvp={{0xc, 0x1, 'rsvp\x00'}, {0xfffffffffffffe79, 0x2, [@TCA_RSVP_ACT={0x20, 0x6, @m_skbedit={0x1c, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x4}, {0x4}}}}]}}]}, 0x54}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) [ 230.105620] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 00:07:33 executing program 5: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregset(0x15, r0, 0x0, &(0x7f0000000280)={0x0}) 00:07:33 executing program 4: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x8, "b689b20027c90ca3"}, &(0x7f00000000c0)=0x10) 00:07:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r2, 0x0, 0xc, 0x0, &(0x7f0000000000)) 00:07:33 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:33 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x7f, 0x40, 0x3, 0x8}, {0x1, 0x0, 0x8, 0x3e00000000000000}, {0x0, 0x7, 0x1f, 0x3}, {0x80000001, 0x7ec3, 0x5, 0x3}, {0x100000000, 0x2}]}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000280), &(0x7f0000000580)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000100)) sched_setattr(0x0, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e23, 0xcb, @ipv4={[], [], @broadcast}, 0x6}, 0x1c) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 00:07:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) 00:07:33 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000000500000084000000000000009500000000000000e4bfe6670b5540fd29b1ce544599409fe27d5ab5e079c24e0fa94eafd9731d1b17e352d03cad39d3cc3d469e8ce2a83367172a32b89ae0676ed1f6579190303e651b61e3f3ba8003826f9015c5b390e48c12141badb4374bcc97523c148918d937336eca55c1daa85a524986df02448ab61cf704c932124a74151373204c4b4be2240ac6a5d4243e8d70f8"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe1a}, 0x48) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000340)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000000000)={&(0x7f0000001300)=""/4096, 0x1000}) [ 230.917421] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 231.013549] kauditd_printk_skb: 18 callbacks suppressed [ 231.013611] audit: type=1400 audit(1569888454.009:67): avc: denied { prog_load } for pid=8167 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:07:34 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xa) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x8000000000000001, 0x3}, 0x20) 00:07:34 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x5d) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x8, "b689b20027c90ca3"}, &(0x7f00000000c0)=0x10) 00:07:34 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'rose0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="6e13e671508c3e4b1b175c232120"], 0xe) [ 231.233775] audit: type=1400 audit(1569888454.169:68): avc: denied { prog_run } for pid=8167 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:07:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:34 executing program 5: perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x914, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x27003027) keyctl$chown(0x4, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) ptrace$poke(0x5, 0x0, &(0x7f0000000580), 0x9) r2 = socket$inet6(0xa, 0x3, 0xa) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x4e20, 0x40f8, @mcast2, 0x800000000000800}, 0x3c3) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f00000001c0)=0x202, 0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$TIPC_NL_PUBL_GET(r4, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="70000000604de97db1ef3278f070d630ba0a3b02b1f90000000000e4adfe998bb2402d31b57e2779d9fde4850cf2eb0f1952f2d1c7238ac66eaa66d8a436a51e6d33bbece6f6b7dbfde1e141edb1f87480285237fceef06cbb2c4e039c1eefddb7368d69b4e799bcd1e83ceb62dc804a9169be858c8b4f719d4427e220fd026c55ab0c8d285215cdccff57a35b5e02c0b67a0b5b65134e83b510db6e3005750a0d93a06fd55a458fb69cffbf0ea7b162aa88188685e341ed3f2d541a4545a80e62e6fe7b9f567b22d82526da65dbd11ac10a8ce69052763d130762d892737cd7d7dc1aafe15bc716dfcf48ad2cbc39dedca021f1d8d4292f419ff3ae50e9b8ad48454da334d021c7ad49455f118d0df7a4ea57ef6da591f2ee3c1c4c008013ee0520f2d468bf29ae8bd9defe17a74d8671fd4293de7783ada8a320c8601564af9b898e50fedd77a1f3", @ANYRES16, @ANYBLOB="000126bd7000fddbdf2507000000140009000800010000020000080001005a0000002c000200040004000800010004000000080002000400000004000400080002008000000004000400040004001c0004000c00010073797a30000000000c00010073797a3100000000"], 0x3}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="1c010000", @ANYRES16, @ANYBLOB="00002cbd7000ffdbdf250d0000000c0006000800010061000000440004001400010062726f6164636173742d6c696e6b00001c0007000800040096000000080001001600000008000400030000000c00010073797a300000000004000700240006000400020008000100040000000800010003000000040002000800010000000000880004000cef000073797a31000000001400010062726f6164636173742d6c696e6b0000040007001c0007000800040001800000080002000800000008000200050200004400070008000200ff070000080001001300000008000400030000000800010006000000080001001e0000000800030000010000080002008953000008000200b50c00000c0002000800020002210000"], 0x11c}, 0x1, 0x0, 0x0, 0x8c0}, 0x4010) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="78020000", @ANYRES16, @ANYBLOB="00022b000100330000000800010005000000080002000180000008000200ff0300f48500efe39cc808b8f76d8684ae43000800020008000000080001000800000008000100b1000000dc00010044000400200001000a004e2300000005000000000000000000000000000000018dc30000200022000a004e240000000100000000000000000002ffff0000000005000000100001007564703a73797a3000000000100001007564703a73797a32000000000c00020008000200ff000000100001007564703a73797a31000000000c000200080003000000000044000400200001000a004e2400000001097353b8815794d22d4d9947b556f15a09000000200002000a004e2100000000ff0100000000000000000000000000010500000008000300f8ec00003800040008000300010001000800030005000000080001001300000008000300020000000800020000aa00000c000200080001000000f81fb40004000c00010073797a31000000001c00070008000200070000000800040013060000080004003f00000014000700080001001400000008000400010000003c000700080001001b000000080004000300000008000300010100000871c630e10001000800000008000400a50400000800020002000000080002000400000024000700082004000600000008000400ffffff7f08000300ff7f0000080004000300000014000700080004000600000008000300090000003800050008000100657468002c0002000800020007000000080002000100110000000800030001ffffff1c000600040002000800010012000000000000000000000000000000000000000000000000000000009c0a299ada461edd206e15b476b60273391d695ae53303c46be5184be3348e9c0614addbe661"], 0x278}, 0x1, 0x0, 0x0, 0x4800}, 0x1) r5 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="000126bd7000fddbdf2507000000140009000800010000020000080001005a0000002c000200040004000800010004000000080002000400000004000400080002008000000004000400040004001c0004000c00010073797a30000000000c00010073797a3100000000"], 0x3}}, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x0, &(0x7f0000001880), 0x715000) 00:07:34 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:34 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x0, 0x9, 0x8, 0xdb83, 0x8000}) syz_open_pts(0xffffffffffffffff, 0x1) r1 = creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6900) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8001) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40400, 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, &(0x7f0000000000)) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x4000) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYRES32=r5, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYPTR64, @ANYRES16=r4], @ANYRES32, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESOCT]], @ANYRESHEX, @ANYRES16, @ANYRES16=r6, @ANYRES64=r3], 0x6}}, 0x4000000) r7 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r7, 0x0) ioctl$RTC_WIE_OFF(r7, 0x7010) ioctl$UI_SET_ABSBIT(r7, 0x40045567, 0x3) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000180)) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) fcntl$setlease(r8, 0x400, 0x0) [ 231.719691] audit: type=1804 audit(1569888454.709:69): pid=8228 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir134261732/syzkaller.qGMibt/11/bus" dev="sda1" ino=16580 res=1 00:07:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) r3 = socket(0x1, 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030300000300600000000000fff57b016d2763bd56373780398d537500e50600591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x6c, 0x0, 0x0, 0x0) 00:07:34 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newtfilter={0x54, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_cgroup={{0xc, 0x1, 'cgroup\x00'}, {0x22c, 0x2, [@TCA_CGROUP_EMATCHES={0x14, 0x3, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_HDR={0x8}]}, @TCA_CGROUP_EMATCHES={0xc, 0x3, [@TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x54}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) [ 231.997847] audit: type=1804 audit(1569888454.849:70): pid=8235 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir134261732/syzkaller.qGMibt/11/bus" dev="sda1" ino=16580 res=1 [ 232.277566] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 00:07:35 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 232.305166] audit: type=1804 audit(1569888455.249:71): pid=8235 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir134261732/syzkaller.qGMibt/11/bus" dev="sda1" ino=16580 res=1 00:07:35 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) syz_genetlink_get_family_id$team(0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r3, 0x0, 0x0) socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x0, 0x0, &(0x7f0000000380)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) r4 = syz_open_procfs(0x0, 0x0) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r5}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) syz_open_procfs(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000001900)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) syz_genetlink_get_family_id$team(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x4d}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000800)) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d80)={{{@in6=@ipv4={[], [], @initdev}, @in6=@remote}}, {{@in=@local}}}, &(0x7f0000001e80)=0xe8) syz_genetlink_get_family_id$team(0x0) r6 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getpeername$packet(r6, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) syz_genetlink_get_family_id$team(0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r7, r7, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f00000002c0)={0x0, 0x6, {0x0, 0x2, 0x0, 0xe05f8c68f812d071, 0x5}}) syz_genetlink_get_family_id$team(0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r9 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000002600)) syz_genetlink_get_family_id$team(0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) syz_genetlink_get_family_id$team(0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r10, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40) [ 232.548130] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 00:07:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:35 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000000bd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$binfmt_elf32(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="8b"], 0x1) close(r1) accept4(r0, 0x0, 0x0, 0x0) close(r1) [ 232.671994] audit: type=1804 audit(1569888455.339:72): pid=8240 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir134261732/syzkaller.qGMibt/11/bus" dev="sda1" ino=16580 res=1 00:07:35 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 232.888011] dccp_close: ABORT with 1 bytes unread [ 232.894519] audit: type=1400 audit(1569888455.869:73): avc: denied { name_bind } for pid=8285 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 00:07:35 executing program 3: perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x914, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x27003027) keyctl$chown(0x4, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x16) r3 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xb, 0xffffffffffffffff, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$poke(0x5, r4, &(0x7f0000000580), 0x9) r5 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x8000000000000001, 0x3}, 0x20) connect$inet6(r5, &(0x7f0000000500)={0xa, 0x4e20, 0x40f8, @mcast2, 0x800000000000800}, 0x3c3) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, &(0x7f00000001c0)=0x202, 0x8) perf_event_open(0x0, r4, 0xf, r6, 0x18) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PUBL_GET(r7, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="70000000604de97db1ef3278f070d630ba0a3b02b1f90000000000e4adfe998bb2402d31b57e2779d9fde4850cf2eb0f1952f2d1c7238ac66eaa66d8a436a51e6d33bbece6f6b7dbfde1e141edb1f87480285237fceef06cbb2c4e039c1eefddb7368d69b4e799bcd1e83ceb62dc804a9169be858c8b4f719d4427e220fd026c55ab0c8d285215cdccff57a35b5e02c0b67a0b5b65134e83b510db6e3005750a0d93a06fd55a458fb69cffbf0ea7b162aa88188685e341ed3f2d541a4545a80e62e6fe7b9f567b22d82526da65dbd11ac10a8ce69052763d130762d892737cd7d7dc1aafe15bc716dfcf48ad2cbc39dedca021f1d8d4292f419ff3ae50e9b8ad48454da334d021c7ad49455f118d0df7a4ea57ef6da591f2ee3c1c4c008013ee0520f2d468bf29ae8bd9defe17a74d8671fd4293de7783ada8a320c8601564af9b898e50fedd77a1f3", @ANYRES16=r8, @ANYBLOB="000126bd7000fddbdf2507000000140009000800010000020000080001005a0000002c000200040004000800010004000000080002000400000004000400080002008000000004000400040004001c0004000c00010073797a30000000000c00010073797a3100000000"], 0x3}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r6, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="1c010000", @ANYRES16=r8, @ANYBLOB="00002cbd7000ffdbdf250d0000000c0006000800010061000000440004001400010062726f6164636173742d6c696e6b00001c0007000800040096000000080001001600000008000400030000000c00010073797a300000000004000700240006000400020008000100040000000800010003000000040002000800010000000000880004000cef000073797a31000000001400010062726f6164636173742d6c696e6b0000040007001c0007000800040001800000080002000800000008000200050200004400070008000200ff070000080001001300000008000400030000000800010006000000080001001e0000000800030000010000080002008953000008000200b50c00000c0002000800020002210000"], 0x11c}, 0x1, 0x0, 0x0, 0x8c0}, 0x4010) sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="78020000", @ANYRES16=r8, @ANYBLOB="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"], 0x278}, 0x1, 0x0, 0x0, 0x4800}, 0x1) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES16=r9, @ANYBLOB="000126bd7000fddbdf2507000000140009000800010000020000080001005a0000002c000200040004000800010004000000080002000400000004000400080002008000000004000400040004001c0004000c00010073797a30000000000c00010073797a3100000000"], 0x3}}, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x0, &(0x7f0000001880), 0x715000) r10 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r10, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) [ 233.084201] dccp_close: ABORT with 1 bytes unread 00:07:36 executing program 4: socket$inet6(0xa, 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x10, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x52) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000040)={0x802b, 0x1}) write(r1, &(0x7f0000000600)='4', 0x4100) 00:07:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) [ 233.196036] audit: type=1400 audit(1569888455.869:74): avc: denied { node_bind } for pid=8285 comm="syz-executor.1" saddr=::1 src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 233.342528] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 233.368908] audit: type=1400 audit(1569888455.879:75): avc: denied { name_connect } for pid=8285 comm="syz-executor.1" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 00:07:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 00:07:36 executing program 5: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x5d) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x7a, &(0x7f0000000080)={0x0, 0x4, "b689b200"}, &(0x7f00000000c0)=0xc) 00:07:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:36 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 234.030064] audit: type=1800 audit(1569888457.029:76): pid=8357 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16595 res=0 00:07:37 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000021, 0x3], [0xc1]}) [ 234.406133] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 00:07:37 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r2, 0x0, 0x6, 0x0, &(0x7f0000000000)) 00:07:37 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 00:07:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:37 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'vcan0\x00'}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, 0x0, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, 0x0) 00:07:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) 00:07:37 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) [ 234.812700] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 00:07:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='b\n\x00', 0x7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x5011, r0, 0x0) 00:07:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:38 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) read(r0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0xa400295c) creat(&(0x7f0000000200)='./file0/bus\x00', 0x0) 00:07:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) [ 235.175447] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 00:07:38 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x100, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4064, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x7, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000a40)=[{&(0x7f00000000c0)=""/119, 0x77}, {0x0}], 0x2, 0x0) io_cancel(0x0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000006c0)="b259f09e777f2e91a45c38d940bb8eff0638088bffffc12dd6b78abe638a50c9ee140809c5f8b7d6fa", 0x29}, &(0x7f0000000780)) open(&(0x7f0000000040)='./bus\x00', 0x189000, 0x2) syncfs(r1) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) getegid() setresgid(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101000, 0x0) ioctl$BLKRAGET(r3, 0x1263, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r4, &(0x7f0000000080), 0xff97) sendmmsg$alg(r4, 0x0, 0x0, 0x14024140) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, 0x0, 0xf61109ceb0dfca38) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 00:07:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r2, 0x0, 0x14, 0x0, &(0x7f0000000000)) 00:07:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:38 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:38 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x8, 0x2000, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:07:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) 00:07:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) [ 235.679072] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 00:07:38 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:38 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:39 executing program 4: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x5d) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x10, &(0x7f0000000080)={0x0, 0x4, "b689b200"}, &(0x7f00000000c0)=0xc) 00:07:39 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) 00:07:39 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x1c, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844"}, &(0x7f00000000c0)=0x24) 00:07:39 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:39 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) creat(&(0x7f0000000480)='./file1\x00', 0x20) creat(&(0x7f0000000080)='./file0\x00', 0x0) 00:07:39 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:39 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 00:07:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='wchan\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x500) 00:07:39 executing program 4: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x5d) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x82, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 00:07:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) 00:07:39 executing program 1: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:39 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='reno\x00', 0x5) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, 0x0, &(0x7f0000000580)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000001680)={'security\x00'}, &(0x7f0000000580)=0x54) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet6_int(r4, 0x29, 0x4b, &(0x7f0000000400), &(0x7f0000000540)=0x4) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYRESOCT=r1, @ANYRESDEC], 0x2b) 00:07:40 executing program 1: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:40 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c0000001900000000000013dbc6f0e5144c6a56c3a272075ec09c77e81597b3020800001fba4eff27b609db8a328810ba0ecfb2369151fe834e9c27e991f43686cdc4d8030a946cd2001000"/86], 0x1c}}, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x61883bea5100b932, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xf17) unshare(0x40040400) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000080)={{0x100000000, 0x7, 0x12000, 0x0, 0x774}}) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x200e80, 0x14) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ubi_ctrl\x00', 0x2000, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, 0x0, 0x0) fanotify_mark(r5, 0x0, 0x0, r6, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) write$P9_RREAD(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x153) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f00000003c0)) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000240)) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) close(r0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000400)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000180)={0xffffffffffffffff, r1, 0x9f5, 0x63, &(0x7f0000000040)="afadd26e7504c5f39e22000b0b9b81136075d19d7e724c84e17330c2b77f599eaa454d42859a1b4ae09d7840cc7d1abca1fb636017f91eca69b09982011b18b41ab97877596225a1c1143898b8b5175ccf09dd7b3854112c49ecc0548ee15a0d70237e", 0x9439, 0x400, 0x6, 0x8, 0x0, 0x0, 0x80000000, 'syz1\x00'}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x5, 0x84) syz_open_dev$sg(0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 00:07:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000480)="8b", 0x1, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0xbd774e517e4202c7, 0x0) 00:07:40 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) 00:07:40 executing program 1: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:40 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r0, r3, 0x0, 0x8000fffffffe) 00:07:40 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 237.698437] IPVS: ftp: loaded support on port[0] = 21 00:07:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:07:40 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:07:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) recvfrom$unix(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 00:07:41 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:42 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) syz_genetlink_get_family_id$team(0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r3, 0x0, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) getsockopt$inet6_mreq(r1, 0x29, 0x0, 0x0, &(0x7f0000000380)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) r5 = syz_open_procfs(0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xdd) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r6}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) syz_open_procfs(0x0, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000001900)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2000}, 0x4000000) r7 = syz_genetlink_get_family_id$team(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x4d}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000800)) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002200)={&(0x7f0000000940)={0x2f8, r7, 0x0, 0x70bd2c, 0x0, {}, [{{0x8}, {0x17c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0xb4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x2f8}, 0x1, 0x0, 0x0, 0x2000}, 0x4000000) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001d80)={{{@in6=@ipv4={[], [], @initdev}, @in6=@remote}}, {{@in=@local}}}, &(0x7f0000001e80)=0xe8) syz_genetlink_get_family_id$team(0x0) r8 = syz_open_procfs(0x0, 0x0) sendfile(r8, r8, 0x0, 0xdd) getpeername$packet(r8, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000800)) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) syz_genetlink_get_family_id$team(0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r10, r10, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002200)={0x0}}, 0x4000000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f00000002c0)={0x2, 0x6, {0x0, 0x2, 0x0, 0xe05f8c68f812d071, 0x5}}) syz_genetlink_get_family_id$team(0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r11, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) r12 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r12, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r13 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000002600)) syz_genetlink_get_family_id$team(0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x0, r14}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) syz_genetlink_get_family_id$team(0x0) r15 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r15, r15, 0x0, 0xdd) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40) 00:07:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:07:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x11) 00:07:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newtfilter={0x3c, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0xc, 0x2, [@TCA_FLOW_KEYS={0x8}]}}]}, 0x3c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:07:42 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:42 executing program 5: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x5d) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x10, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 00:07:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:07:42 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:42 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x48000000, 0x0, 0x0, 0x0, 0x0) socket(0x3, 0x6, 0x8f8) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) read$FUSE(r2, &(0x7f0000000640), 0xffffffef) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000280)={0x2e4b, 0x20, 0xfffffe01, 0x1, 0x16, 0x80, 0x7, 0x20, 0x3, 0x81, 0x4, 0x6}) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r3, 0x0, r4, 0x0, 0xffffffff, 0x0) read$FUSE(r4, &(0x7f0000000640), 0xffffffef) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) bind$inet6(r6, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r6, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x18, r7, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x4}]}, 0x18}}, 0x20000011) sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000040)={0x140, r7, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffb2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x4}, 0x8004) [ 239.887341] sctp: [Deprecated]: syz-executor.5 (pid 8741) Use of struct sctp_assoc_value in delayed_ack socket option. [ 239.887341] Use struct sctp_sack_info instead 00:07:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x11) 00:07:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:07:43 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) [ 240.458540] sctp: [Deprecated]: syz-executor.5 (pid 8732) Use of struct sctp_assoc_value in delayed_ack socket option. [ 240.458540] Use struct sctp_sack_info instead [ 240.604608] IPVS: ftp: loaded support on port[0] = 21 [ 240.920283] IPVS: ftp: loaded support on port[0] = 21 [ 241.000034] ptrace attach of "/root/syz-executor.3"[8798] was attempted by "/root/syz-executor.3"[8823] 00:07:44 executing program 4: 00:07:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:07:44 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x11) 00:07:44 executing program 5: 00:07:44 executing program 5: 00:07:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 00:07:44 executing program 4: 00:07:47 executing program 3: 00:07:47 executing program 5: 00:07:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 00:07:47 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) 00:07:47 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844e9e9a63047121cae5e6beaf618ab2f2703bbd1bbc43ab9adf5227a49"}, &(0x7f00000000c0)=0x40) 00:07:47 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) 00:07:47 executing program 5: 00:07:47 executing program 3: 00:07:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 00:07:47 executing program 5: 00:07:47 executing program 4: 00:07:47 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, &(0x7f00000000c0)) 00:07:47 executing program 3: 00:07:47 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) 00:07:47 executing program 4: 00:07:47 executing program 5: 00:07:47 executing program 3: 00:07:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:47 executing program 4: 00:07:47 executing program 3: 00:07:47 executing program 5: 00:07:47 executing program 4: 00:07:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:48 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, &(0x7f00000000c0)) 00:07:48 executing program 5: 00:07:48 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) 00:07:48 executing program 4: 00:07:48 executing program 3: 00:07:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:48 executing program 5: 00:07:48 executing program 3: 00:07:48 executing program 4: 00:07:48 executing program 5: 00:07:48 executing program 4: 00:07:48 executing program 3: 00:07:49 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, &(0x7f00000000c0)) 00:07:49 executing program 3: 00:07:49 executing program 5: 00:07:49 executing program 4: socket$key(0xf, 0x3, 0x2) socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x2f, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@xdp, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:07:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 00:07:49 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:49 executing program 3: 00:07:49 executing program 5: 00:07:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) [ 246.372797] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:07:49 executing program 3: 00:07:49 executing program 5: 00:07:49 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:50 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000), &(0x7f00000000c0)=0x8) 00:07:50 executing program 3: 00:07:50 executing program 5: 00:07:50 executing program 4: 00:07:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:50 executing program 5: 00:07:50 executing program 3: 00:07:50 executing program 4: 00:07:50 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000), &(0x7f00000000c0)=0x8) 00:07:50 executing program 5: 00:07:50 executing program 4: 00:07:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) 00:07:50 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x48000000, 0x0, 0x0, 0x0, 0x0) socket(0x3, 0x6, 0x8f8) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) read$FUSE(r2, &(0x7f0000000640), 0xffffffef) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000280)={0x2e4b, 0x20, 0xfffffe01, 0x1, 0x16, 0x80, 0x7, 0x20, 0x3, 0x81, 0x4, 0x6}) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r3, 0x0, r4, 0x0, 0xffffffff, 0x0) read$FUSE(r4, &(0x7f0000000640), 0xffffffef) socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(0xffffffffffffffff) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x18, r6, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x4}]}, 0x18}}, 0x20000011) 00:07:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 00:07:51 executing program 5: 00:07:51 executing program 4: [ 248.213012] IPVS: ftp: loaded support on port[0] = 21 00:07:51 executing program 5: 00:07:51 executing program 4: 00:07:51 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000), &(0x7f00000000c0)=0x8) 00:07:51 executing program 5: [ 248.845453] IPVS: ftp: loaded support on port[0] = 21 00:07:52 executing program 4: 00:07:52 executing program 5: 00:07:52 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x1c, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844"}, &(0x7f00000000c0)=0x24) 00:07:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) 00:07:52 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x48000000, 0x0, 0x0, 0x0, 0x0) socket(0x3, 0x6, 0x8f8) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) read$FUSE(r2, &(0x7f0000000640), 0xffffffef) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000280)={0x2e4b, 0x20, 0xfffffe01, 0x1, 0x16, 0x80, 0x7, 0x20, 0x3, 0x81, 0x4, 0x6}) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r3, 0x0, r4, 0x0, 0xffffffff, 0x0) read$FUSE(r4, &(0x7f0000000640), 0xffffffef) socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(0xffffffffffffffff) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x18, r6, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x4}]}, 0x18}}, 0x20000011) 00:07:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}]]}}}]}, 0x38}}, 0x0) 00:07:52 executing program 5: 00:07:52 executing program 4: [ 249.258825] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 00:07:52 executing program 5: 00:07:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}]]}}}]}, 0x38}}, 0x0) 00:07:52 executing program 5: 00:07:52 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000), &(0x7f00000000c0)=0x8) [ 249.559014] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 249.697108] IPVS: ftp: loaded support on port[0] = 21 00:07:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}]]}}}]}, 0x38}}, 0x0) 00:07:53 executing program 5: 00:07:53 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000), &(0x7f00000000c0)=0x8) 00:07:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) [ 250.274742] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 00:07:53 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x48000000, 0x0, 0x0, 0x0, 0x0) socket(0x3, 0x6, 0x8f8) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) read$FUSE(r2, &(0x7f0000000640), 0xffffffef) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000280)={0x2e4b, 0x20, 0xfffffe01, 0x1, 0x16, 0x80, 0x7, 0x20, 0x3, 0x81, 0x4, 0x6}) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r3, 0x0, r4, 0x0, 0xffffffff, 0x0) read$FUSE(r4, &(0x7f0000000640), 0xffffffef) socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(0xffffffffffffffff) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x18, r6, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x4}]}, 0x18}}, 0x20000011) 00:07:53 executing program 4: 00:07:53 executing program 5: 00:07:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x38}}, 0x0) 00:07:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:53 executing program 5: 00:07:53 executing program 4: 00:07:53 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000), &(0x7f00000000c0)=0x8) [ 250.994862] IPVS: ftp: loaded support on port[0] = 21 [ 251.081426] ptrace attach of "/root/syz-executor.3"[9309] was attempted by "/root/syz-executor.3"[9310] 00:07:54 executing program 4: 00:07:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x38}}, 0x0) 00:07:54 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0xe, "b689b20027c90ca3d3b0660154a8"}, &(0x7f00000000c0)=0x16) 00:07:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:57 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x48000000, 0x0, 0x0, 0x0, 0x0) socket(0x3, 0x6, 0x8f8) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) read$FUSE(r2, &(0x7f0000000640), 0xffffffef) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000280)={0x2e4b, 0x20, 0xfffffe01, 0x1, 0x16, 0x80, 0x7, 0x20, 0x3, 0x81, 0x4, 0x6}) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r3, 0x0, r4, 0x0, 0xffffffff, 0x0) read$FUSE(r4, &(0x7f0000000640), 0xffffffef) socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(0xffffffffffffffff) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x18, r6, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x4}]}, 0x18}}, 0x20000011) 00:07:57 executing program 5: 00:07:57 executing program 4: 00:07:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x38}}, 0x0) 00:07:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:57 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0xe, "b689b20027c90ca3d3b0660154a8"}, &(0x7f00000000c0)=0x16) 00:07:57 executing program 5: 00:07:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@gre_common_policy, @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x38}}, 0x0) 00:07:57 executing program 4: 00:07:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@gre_common_policy, @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x38}}, 0x0) 00:07:57 executing program 5: [ 254.731948] IPVS: ftp: loaded support on port[0] = 21 00:07:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:58 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsold']) 00:07:58 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0) 00:07:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0x7ffff000}], 0x1, 0x0, 0xffffffffffffff30}}], 0x1, 0x0, 0x0) 00:07:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@gre_common_policy, @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x38}}, 0x0) 00:07:58 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0xe, "b689b20027c90ca3d3b0660154a8"}, &(0x7f00000000c0)=0x16) 00:07:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) [ 255.860010] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 00:07:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) 00:07:59 executing program 5: [ 256.044159] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 [ 256.081743] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 00:07:59 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x15, "b689b20027c90ca3d3b0660154a8552b3685b77e95"}, &(0x7f00000000c0)=0x1d) 00:07:59 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsold']) 00:07:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:07:59 executing program 4: 00:07:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 256.399101] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 [ 256.429031] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 00:07:59 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 00:07:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x40}}, 0x0) 00:07:59 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsold']) [ 256.709822] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 00:07:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000000601dfff0000000000000000007d0000"], 0x14}}, 0x0) 00:07:59 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x15, "b689b20027c90ca3d3b0660154a8552b3685b77e95"}, &(0x7f00000000c0)=0x1d) 00:07:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:07:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) [ 256.972063] kauditd_printk_skb: 2 callbacks suppressed [ 256.972077] audit: type=1400 audit(1569888479.979:79): avc: denied { create } for pid=9576 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 257.024065] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 00:08:00 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000180)={@remote, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x14, 0x2b, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0xd]}, @local, {[@srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, [@remote, @loopback, @loopback, @mcast2, @rand_addr="dfdc5a3fdfc65c48a7f3be2a64adfb37", @dev]}, @hopopts={0x0, 0x0, [], [@enc_lim, @jumbo, @hao={0xc9, 0x0, @dev}, @padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x0, @loopback}, @calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}}, @padn={0x1, 0x0, [0x0, 0x0, 0x0]}]}, @srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, [@loopback, @loopback, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @multicast1}, @mcast2, @remote, @ipv4={[], [], @dev}, @mcast1]}, @dstopts={0x0, 0x0, [], [@padn={0x1, 0x0, [0x0, 0x0, 0x0]}, @generic={0x0, 0x0, "143bba0e7739fe604d6f8035b53fd4d43044b137da726d061bf89d109e3bba48fb80947deae1109bd926d7cd263f961905b7010dbb2ed12efcd88937b6b3a311d719dc1a2b57c621714d7d916bf0958a88448896dc47da5a46abf12c43"}, @enc_lim, @jumbo, @calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0]}}, @calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}, @routing={0x0, 0x0, 0x0, 0x0, 0x0, [@dev, @empty]}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1}}}}}}}, 0x0) 00:08:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040), 0x0, 0x0) 00:08:00 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsold']) 00:08:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:00 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x0, 0x0) io_cancel(0x0, 0x0, 0x0) open(0x0, 0x189000, 0x0) syncfs(r0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x14024140) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 00:08:00 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x15, "b689b20027c90ca3d3b0660154a8552b3685b77e95"}, &(0x7f00000000c0)=0x1d) 00:08:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) 00:08:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 257.646642] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 00:08:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:00 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsold']) 00:08:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'eql\x00\x00\x00\x00\x8f@\x00', 0x1202}) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000080)={'eql\x00i\x0e\xa9[\x00\xce\x00', @ifru_mtu=0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept$unix(0xffffffffffffffff, 0x0, 0x0) 00:08:01 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x19, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459"}, &(0x7f00000000c0)=0x21) 00:08:01 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsold']) [ 258.399306] : renamed from eql 00:08:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 00:08:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x11) 00:08:01 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsold']) 00:08:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 258.795466] : renamed from eql 00:08:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 00:08:02 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x19, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459"}, &(0x7f00000000c0)=0x21) 00:08:02 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsold']) 00:08:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000280)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 00:08:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 00:08:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:02 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsold']) 00:08:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) [ 259.515872] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:08:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:02 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsold']) 00:08:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:03 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x19, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459"}, &(0x7f00000000c0)=0x21) 00:08:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'batadv0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00\x06\bz\x00', 0xf7fffffffffffffd}) 00:08:03 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:08:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 260.432864] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 00:08:03 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:08:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) 00:08:03 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x1b, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d8"}, &(0x7f00000000c0)=0x23) [ 260.849409] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 00:08:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:04 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:08:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 261.343938] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 [ 261.610708] device batadv0 entered promiscuous mode [ 261.617041] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 261.784707] device batadv0 left promiscuous mode [ 262.384863] device batadv0 entered promiscuous mode [ 262.401773] 8021q: adding VLAN 0 to HW filter on device batadv0 00:08:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0xc0801, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0xf4e0bbf3fe26f243}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0xfdef) 00:08:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) 00:08:05 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:05 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x1b, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d8"}, &(0x7f00000000c0)=0x23) 00:08:05 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) 00:08:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:05 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 262.551346] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 [ 262.553929] device nr0 entered promiscuous mode 00:08:05 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) 00:08:05 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x1b, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d8"}, &(0x7f00000000c0)=0x23) 00:08:05 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 262.938722] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 00:08:06 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) [ 263.203033] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 [ 263.515421] device nr0 entered promiscuous mode 00:08:06 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000640)={0x0, 0x0, 0x91}, 0x0, 0x0, &(0x7f0000000780)=""/145) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x9) preadv(r0, &(0x7f0000000480), 0x1000000000000084, 0xf0ffff) 00:08:06 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x1c, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844"}, 0x0) 00:08:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) 00:08:06 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) 00:08:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 263.913294] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 00:08:07 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) 00:08:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:07 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000640)={0x0, 0x0, 0x91}, 0x0, 0x0, &(0x7f0000000780)=""/145) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x9) preadv(r0, &(0x7f0000000480), 0x1000000000000084, 0xf0ffff) 00:08:07 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x1c, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844"}, 0x0) [ 264.245716] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 00:08:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:07 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) 00:08:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x9}], 0x1, 0x0) 00:08:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) [ 264.707807] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 00:08:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:07 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrie']) 00:08:07 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@umask={'umask'}}]}) 00:08:08 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x1c, "b689b20027c90ca3d3b0660154a8552b3685b77e95f0e87459d5d844"}, 0x0) 00:08:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x0, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) [ 265.164435] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "barrie" 00:08:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x0, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xf}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:08:08 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrie']) 00:08:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x0, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) [ 265.708274] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "barrie" 00:08:08 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:08:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000340)='./bus\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000000)="eb3c906d6b66732e6661740002040100cc6b9d7820079db3ae9502000270fff8", 0xfffffddc}], 0x1000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:08:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:09 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrie']) 00:08:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) [ 266.312478] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "barrie" 00:08:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:09 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jq']) 00:08:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 266.663087] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "jq" 00:08:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 00:08:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:09 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jq']) [ 267.160618] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "jq" 00:08:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r2, 0x0, 0x2, 0x0, &(0x7f0000000000)) 00:08:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x50, 0x10, 0x705, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_LINKINFO={0x30, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x24, 0x2, [@gre_common_policy=[@IFLA_GRE_PMTUDISC={0x8}, @IFLA_GRE_IGNORE_DF={0x8}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x50}}, 0x0) 00:08:10 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jq']) [ 267.422471] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 00:08:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 267.533991] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 267.589460] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "jq" [ 267.600667] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:08:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x60, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x9, 0x2, [@TCA_FQ_RATE_ENABLE={0x8, 0xa}, @TCA_FQ_FLOW_DEFAULT_RATE={0x8}, @TCA_FQ_FLOW_PLIMIT={0x8}, @TCA_FQ_BUCKETS_LOG={0xffffffffffffff7c, 0x3}, @TCA_FQ_PLIMIT={0x8}, @TCA_FQ_INITIAL_QUANTUM={0x8}]}}]}, 0x60}}, 0x0) 00:08:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:10 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=v']) 00:08:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x50, 0x10, 0x705, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_LINKINFO={0x30, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x24, 0x2, [@gre_common_policy=[@IFLA_GRE_PMTUDISC={0x8}, @IFLA_GRE_IGNORE_DF={0x8}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x50}}, 0x0) [ 267.831524] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 267.951916] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 267.992041] REISERFS warning (device loop3): super-6514 reiserfs_parse_options: unknown quota format specified. 00:08:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 268.035373] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 268.068112] netlink: 'syz-executor.2': attribute type 19 has an invalid length. 00:08:11 executing program 1: getresuid(0x0, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) msgget$private(0x0, 0x0) pipe(0x0) setresuid(0x0, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fstat(0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000380)={{}, 0x0, 0x0, 0x5}) [ 268.114350] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:08:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:11 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=v']) 00:08:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x0, 0x300) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18}, 0x18) sendto$inet(r0, &(0x7f0000000480)="8b", 0x1, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/148, 0xff1e}], 0x1}}, {{0x0, 0xffffffffffffffcd, 0x0}}], 0x40001de, 0x0, 0x0) 00:08:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 268.413419] REISERFS warning (device loop3): super-6514 reiserfs_parse_options: unknown quota format specified. 00:08:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) close(0xffffffffffffffff) 00:08:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002110270fff8", 0xffdf}], 0x0, 0x0) [ 268.630674] protocol 88fb is buggy, dev hsr_slave_0 [ 268.635828] protocol 88fb is buggy, dev hsr_slave_1 00:08:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:11 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=v']) 00:08:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) close(0xffffffffffffffff) [ 268.821471] FAT-fs (loop1): bogus number of directory entries (529) [ 268.828186] FAT-fs (loop1): Can't find a valid FAT filesystem [ 268.870643] protocol 88fb is buggy, dev hsr_slave_0 [ 268.875836] protocol 88fb is buggy, dev hsr_slave_1 [ 268.994021] REISERFS warning (device loop3): super-6514 reiserfs_parse_options: unknown quota format specified. 00:08:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) close(0xffffffffffffffff) [ 269.074316] FAT-fs (loop1): bogus number of directory entries (529) [ 269.120590] protocol 88fb is buggy, dev hsr_slave_0 [ 269.125800] protocol 88fb is buggy, dev hsr_slave_1 [ 269.131952] FAT-fs (loop1): Can't find a valid FAT filesystem 00:08:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:12 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfso']) 00:08:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x104) ptrace$setopts(0x4206, r1, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000042c00) 00:08:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) syz_emit_ethernet(0x300502, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) 00:08:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 269.533891] REISERFS warning (device loop3): super-6514 reiserfs_parse_options: unknown quota format specified. [ 269.599802] audit: type=1400 audit(1569888492.579:80): avc: denied { map } for pid=10411 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=504 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 00:08:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:12 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfso']) 00:08:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 269.853274] ptrace attach of "/root/syz-executor.2"[10436] was attempted by "/root/syz-executor.2"[10437] [ 269.986283] REISERFS warning (device loop3): super-6514 reiserfs_parse_options: unknown quota format specified. 00:08:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:13 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x406, r1) readlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000400)=""/242, 0xf2) socket$inet(0x2, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000340)=ANY=[@ANYBLOB="0202200313000000000000ffff00ff0005000600571866720a000068c3f2b5359eed8104200000005500000000000000000000000000000005000900df0000002a00002000000000fe8000000000000007000000000000ff00000000000000000200010000ffff000000050d0000001005000500eb0000000a00000000000000ff020000000000000000000008f500010000000000000000"], 0x98}}, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f000023b000/0x2000)=nil) getpgid(0x0) personality(0x0) umount2(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) 00:08:13 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfso']) 00:08:13 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 270.460210] REISERFS warning (device loop3): super-6514 reiserfs_parse_options: unknown quota format specified. 00:08:13 executing program 2: mknod(&(0x7f00000006c0)='./bus\x00', 0x1000, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000140)={0xf}, 0xf) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x280, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000ac0)=ANY=[], 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_aout(r2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="000007002d020000c400000001000000a80200000400000000000000000000006c30a200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a349f8c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d2f50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000000000000000000000000000000000009d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009785f03caa2287c700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005e360000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000005e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000874d36948cba"], 0x52a) getpid() r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) fstat(r3, &(0x7f0000000800)) r4 = getpgrp(0x0) setpriority(0x0, r4, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x375) keyctl$get_persistent(0x3, r5, 0x0) getresgid(0x0, &(0x7f0000000300)=0x0, &(0x7f0000000340)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)=0x0) getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) setsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000580)={r8, r9, r6}, 0xc) setpriority(0x0, 0x0, 0x0) r10 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r10, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_aout(r10, &(0x7f0000000ac0)=ANY=[@ANYBLOB="000007002d020000c400000001000000a80200000400000000000000000000006c30a200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a349f8c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d2f50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000000000000000000000000000000000009d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009785f03caa2287c700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005e360000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000005e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000874d36948cba1cd2ab941d1f548a5abc1bb48b3c70bd95f57620f56d38e1b94efd57b6ac5738b6adab00a82191309d3a7a0e8ed621cb0c5f4d7c682a6d0d566d3cd26b0b7e76c5c8495c1aa0b8c39434fc5156a7f2f93132f013c25d5c6bc24feed620c70b053cc8409c3f427e3bcaa895e50a695b890fb16b2c70f9fedb283c36f45fdf18abead4e001cf797a111579e91d869001dbf42cce2d1ff6a1578c61af64acc20dea268bd0edf65709328fb3bd926b323049926276bb1787d0ad77585bbbfc7cd1b3"], 0x5ea) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f0000000880)=0xc) lstat(&(0x7f00000008c0)='./bus/file0\x00', &(0x7f0000000900)) r11 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r11, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r11, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_aout(r11, 0x0, 0x0) r12 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r12, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xe0}]}, 0x10) r13 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r13, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r13, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_aout(r13, &(0x7f0000000ac0)=ANY=[@ANYBLOB="000007002d020000c400000001000000a80200000400000000000000000000006c30a200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a349f8c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d2f50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000000000000000000000000000000000009d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009785f03caa2287c700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005e360000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000005e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000874d36948cba1cd2ab941d1f548a5abc1bb48b3c70bd95f57620f56d38e1b94efd57b6ac5738b6adab00a82191309d3a7a0e8ed621cb0c5f4d7c682a6d0d566d3cd26b0b7e76c5c8495c1aa0b8c39434fc5156a7f2f93132f013c25d5c6bc24feed620c70b053cc8409c3f427e3bcaa895e50a695b890fb16b2c70f9fedb283c36f45fdf18abead4e001cf797a111579e91d869001dbf42cce2d1ff6a1578c61af64acc20dea268bd0edf65709328fb3bd926b323049926276bb1787d0ad77585bbbfc7cd1b316fc277bbc65f6bdd501a7bacfdea7d87e8619cd8dbf1214"], 0x523) r14 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r14, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r14, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_aout(r14, &(0x7f0000001140)=ANY=[@ANYBLOB="000007002d020000c400000001000000a80200000400000000000000000000006c30a200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a349f8c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d2f50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000000000000000000000000000000000009d000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009785f03caa2287c700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005e360000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000005e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000874d36948cba1cd2ab941d1f548a5abc1bb48b3c70bd95f57620f56d38e1b94efd57b6ac5738b6adab00a82191309d3a7a0e8ed621cb0c5f4d7c682a6d0d566d3cd26b0b7e76c5c8495c1aa0b8c39434fc5156a7f2f93132f013c25d5c6bc24feed620c70b053cc8409c3f427e3bcaa895e50a695b890fb16b2c70f9fedb283c36f45fdf18abead4e001cf797a111579e91d869001dbf42cce2d1ff6a1578c61af64acc20dea268bd0edf65709328fb3bd926b323049926276bb1787d0ad77585bbbfc7cd1b316fc277bbc65f6bdd501a7bacfdea7d87e8619cd8dbf1214cda9d2e7ee994748b09c94245c3fedb5f36d7d8f660470d853af9ebb75766702b17040b02d597cc339dbcc603c26a5b061cdbd827f80faf1b9955d4c18b2cecf096888947912725a0c"], 0x523) r15 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r15, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe0}]}, 0x10) sendmsg$unix(r0, &(0x7f0000000a80)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x200c00c4}, 0x800) open(&(0x7f0000000080)='./bus/file0\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r16 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r16, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r16, 0x5) r17 = socket$inet6_sctp(0xa, 0x1, 0x84) r18 = accept4(r16, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r17, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r18, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0) 00:08:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:13 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsol']) 00:08:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:13 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) close(0xffffffffffffffff) [ 270.960245] REISERFS warning (device loop3): super-6514 reiserfs_parse_options: unknown quota format specified. 00:08:14 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:14 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsol']) [ 271.273982] REISERFS warning (device loop3): super-6514 reiserfs_parse_options: unknown quota format specified. 00:08:14 executing program 1: r0 = socket$kcm(0x10, 0x80003, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000002c008151e00f80ec0400b904014865160b00014101410000000f00170000001f1500cd5edc00000000b4", 0x2e}], 0x1}, 0x0) 00:08:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:14 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) 00:08:14 executing program 2: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregset(0x15, r0, 0x202, &(0x7f0000000280)={0x0}) 00:08:14 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='usrjquota=Syz,barrier=flush,jqfmt=vfsol']) 00:08:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) close(0xffffffffffffffff) [ 271.879902] REISERFS warning (device loop3): super-6514 reiserfs_parse_options: unknown quota format specified. [ 271.897675] Enabling of bearer <Ü> rejected, illegal name 00:08:14 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) 00:08:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) close(0xffffffffffffffff) 00:08:15 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, 0x0) pipe(0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg$key(r1, &(0x7f0000000000)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0200000007002c00001a000017a667beda8e44a6"], 0x2a1}}, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz0\x00', {0x0, 0x7, 0x0, 0x2}, 0x0, [0x0, 0x917, 0x0, 0x9d7, 0x400, 0x3f, 0x200, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x9, 0x8, 0x2, 0x7, 0x6, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7f, 0x0, 0x0, 0x7fffffff, 0xdc, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x102, 0x5, 0x3, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x7, 0x67, 0x71da0000, 0x0, 0x0, 0x5f0ecdc6, 0x3], [0x3, 0x8515, 0x547cc5e2, 0xc, 0x0, 0x0, 0x401, 0x7, 0x8, 0x100000000, 0x0, 0x8c5e, 0x0, 0x80000000, 0x8000, 0x0, 0x0, 0x2, 0x94, 0x987, 0x7, 0x0, 0x0, 0x0, 0x808000000, 0x4, 0x0, 0x9, 0x0, 0x0, 0x3, 0x73374fc8, 0x12db153e, 0x5, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x5e, 0x5, 0x753ca947, 0x8, 0x0, 0x40000036, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x7, 0x10000, 0x0, 0x5, 0x3ff, 0xfff, 0x0, 0x5, 0x1], [0x4, 0x7, 0x0, 0x4, 0x0, 0x102, 0xfffffffffffffff7, 0x0, 0x400, 0x7, 0x5, 0x0, 0xffff, 0x101, 0x8001, 0x1000, 0x0, 0xf2d8, 0x100, 0x0, 0x0, 0x0, 0x3, 0x0, 0x101, 0x9, 0x8, 0x200, 0x9, 0x0, 0x0, 0x7fffffff, 0x6, 0x4, 0x0, 0x7, 0x9, 0x9, 0x0, 0x3, 0xe8f594b, 0x4, 0x0, 0xa13, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x3f, 0x0, 0xfff, 0x101, 0xffffffffffffffff, 0x0, 0x2, 0x400000, 0x0, 0x353, 0x4, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x80000001], [0x1cfd, 0x0, 0x3, 0xffffffffffff8bbf, 0x0, 0x0, 0x8, 0x0, 0x6, 0x7, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe946, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x8, 0x1, 0x0, 0x80000001, 0x4da2, 0x0, 0x57732e75, 0x0, 0x3f, 0x8000, 0xff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9c7, 0x0, 0x0, 0x0, 0x5309]}, 0x45c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) getresgid(&(0x7f0000000340), 0x0, &(0x7f0000000900)) stat(&(0x7f0000000a00)='./file0\x00', 0x0) getgroups(0x3, &(0x7f0000000ac0)=[0xee00, 0x0, 0x0]) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) fstat(r2, &(0x7f00000003c0)) listen(0xffffffffffffffff, 0x7ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x103d05, 0x0) fstat(0xffffffffffffffff, &(0x7f00000003c0)) getgid() r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) pivot_root(0x0, 0x0) 00:08:15 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18}, 0x18) sendto$inet(r0, &(0x7f0000000480)="8b", 0x1, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/148, 0xff1e}], 0x1}}, {{0x0, 0xffffffffffffffcd, 0x0}}], 0x40001de, 0x0, 0x0) 00:08:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) 00:08:15 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x3, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x28}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 00:08:15 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xfffffdd2) creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 272.549861] audit: type=1804 audit(1569888495.549:81): pid=10638 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir160713038/syzkaller.ke0QF5/75/bus" dev="sda1" ino=16829 res=1 00:08:15 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x5d) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x4, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) r3 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) 00:08:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x11) 00:08:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 272.889798] audit: type=1804 audit(1569888495.889:82): pid=10656 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir307533647/syzkaller.mqyu3f/74/bus" dev="sda1" ino=16831 res=1 00:08:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 00:08:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) socketpair$unix(0x1, 0x800000000000001, 0x0, &(0x7f00000009c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000600)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iqv\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x00\x00\x00\x00\x00\x00\x00\xae\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.g\x10H\xa8\xc9\x1f\xfc\x1e\xdfF\x16K\a@\x8c7\x1d!\xfd\xb0\xefW\x8f\xb8\x19\x8dS\xcer\x00SE\xdcD\xd2\x98\fy\x8dQ?7m\x9a\xe3\xca\xb0~\xdb*\xa7\xbf\xeftV\xa1\x94\x911\xa7\x8cYiY\xd2\xecF\xec\xb4/\xca\x97~^o\xd74\x11\'\xe1\xce\x06\xe1\xebV\xfd\xaa\x19\xd3\x14\xad\xea=o\xf2\x15g\xa9\xca\xa7\xc6\xd6\xaa\x86\xcc\x03\xcfD\xfe\x0f\xd4\xa7\x9f\xd8\n\x13T\x83\xdb\x19}\xf1\xa9\xac\x9eV\xb9\x15\x852\xfd\xaea\xff\xcb\x86d:\n\x85\x807]\x96\xb4\x96\xbc\xa6\xe6\x86\x80Gy\xfe\x8c\x1aV\xce\xb2h\xfd\xee*\xf0\xb3\xc38o\xac\x96Y\xa6\x81~\x8e\x8b@k\x7f\x88\xdd<}\x91\x83\xb0[\xff\xe3\xb9\xc6P\xd7\xc9\x87 \xef\xc9M\xa7\xbc\x1c\xa4~\x9b\xee\x94\x02&\x980\x10\x96\x96\\\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x20020102000007) ftruncate(r1, 0x0) [ 273.172323] audit: type=1804 audit(1569888496.179:83): pid=10656 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir307533647/syzkaller.mqyu3f/74/bus" dev="sda1" ino=16831 res=1 00:08:16 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xfffffdd2) creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 273.270596] protocol 88fb is buggy, dev hsr_slave_0 [ 273.275742] protocol 88fb is buggy, dev hsr_slave_1 00:08:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, 0x0) [ 273.426472] audit: type=1804 audit(1569888496.349:84): pid=10673 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir307533647/syzkaller.mqyu3f/74/bus" dev="sda1" ino=16831 res=1 [ 273.430631] protocol 88fb is buggy, dev hsr_slave_0 [ 273.458238] protocol 88fb is buggy, dev hsr_slave_1 00:08:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newtfilter={0x48, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_matchall={{0x10, 0x1, 'matchall\x00'}, {0x14, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}, @TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x48}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:08:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 273.593849] audit: type=1804 audit(1569888496.599:85): pid=10700 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir160713038/syzkaller.ke0QF5/76/bus" dev="sda1" ino=16797 res=1 00:08:16 executing program 2: syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x0, 0x9, 0x0, 0xdb83, 0x8000}) syz_open_pts(0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6900) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8001) openat$ptmx(0xffffffffffffff9c, 0x0, 0x40400, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, 0x0) pipe2(&(0x7f00000004c0), 0x4000) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000400)}, 0x4000000) r3 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r3, 0x0) ioctl$RTC_WIE_OFF(r3, 0x7010) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) fcntl$setlease(r4, 0x400, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x7, 0x182) 00:08:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, 0x0) 00:08:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:16 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) sendmmsg(r0, &(0x7f0000003880)=[{{&(0x7f0000000080)=@rc, 0x80, 0x0}}], 0x1, 0x0) [ 274.027846] audit: type=1804 audit(1569888497.029:86): pid=10726 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir307533647/syzkaller.mqyu3f/76/bus" dev="sda1" ino=16839 res=1 00:08:17 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x19031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xa, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000fb5ff0)=[{0x0}], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syncfs(0xffffffffffffffff) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000000c0)=""/118) fsetxattr$security_ima(r3, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "18"}, 0x2, 0x0) syz_open_procfs(0x0, 0x0) [ 274.147804] audit: type=1804 audit(1569888497.099:87): pid=10731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir307533647/syzkaller.mqyu3f/76/bus" dev="sda1" ino=16839 res=1 [ 274.369129] audit: type=1804 audit(1569888497.369:88): pid=10726 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir307533647/syzkaller.mqyu3f/76/bus" dev="sda1" ino=16839 res=1 [ 274.495741] audit: type=1804 audit(1569888497.409:89): pid=10735 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir307533647/syzkaller.mqyu3f/76/bus" dev="sda1" ino=16839 res=1 00:08:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, 0x0) 00:08:17 executing program 3: 00:08:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) syslog(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4000) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000100)) 00:08:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9fb4dde984510c82dc2b06b29e22fe2d1deeaf293028affade7c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e40f088ca1fffffff0e00000063a377fbac14140ce9", 0x0, 0x9}, 0x28) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000640)) 00:08:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) 00:08:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)) 00:08:19 executing program 5: ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @mcast2}]}, 0x28}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40000) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100), 0x0) 00:08:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000040)) 00:08:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)) 00:08:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:19 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, &(0x7f0000000700)) 00:08:19 executing program 5: socket$key(0xf, 0x3, 0x2) socket$unix(0x1, 0x1, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 276.796511] audit: type=1400 audit(1569888499.799:90): avc: denied { syslog } for pid=10792 comm="syz-executor.1" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 00:08:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x800000000000001, 0x0, &(0x7f00000009c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000600)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iqv\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x00\x00\x00\x00\x00\x00\x00\xae\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.g\x10H\xa8\xc9\x1f\xfc\x1e\xdfF\x16K\a@\x8c7\x1d!\xfd\xb0\xefW\x8f\xb8\x19\x8dS\xcer\x00SE\xdcD\xd2\x98\fy\x8dQ?7m\x9a\xe3\xca\xb0~\xdb*\xa7\xbf\xeftV\xa1\x94\x911\xa7\x8cYiY\xd2\xecF\xec\xb4/\xca\x97~^o\xd74\x11\'\xe1\xce\x06\xe1\xebV\xfd\xaa\x19\xd3\x14\xad\xea=o\xf2\x15g\xa9\xca\xa7\xc6\xd6\xaa\x86\xcc\x03\xcfD\xfe\x0f\xd4\xa7\x9f\xd8\n\x13T\x83\xdb\x19}\xf1\xa9\xac\x9eV\xb9\x15\x852\xfd\xaea\xff\xcb\x86d:\n\x85\x807]\x96\xb4\x96\xbc\xa6\xe6\x86\x80Gy\xfe\x8c\x1aV\xce\xb2h\xfd\xee*\xf0\xb3\xc38o\xac\x96Y\xa6\x81~\x8e\x8b@k\x7f\x88\xdd<}\x91\x83\xb0[\xff\xe3\xb9\xc6P\xd7\xc9\x87 \xef\xc9M\xa7\xbc\x1c\xa4~\x9b\xee\x94\x02&\x980\x10\x96\x96\\\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x20020102000007) ftruncate(r1, 0x0) [ 276.945657] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:08:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:08:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)) 00:08:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x24, 0x2, [@gre_common_policy=[@IFLA_GRE_PMTUDISC={0x8}, @IFLA_GRE_IGNORE_DF={0x8}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x20}], @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x50}}, 0x0) [ 277.286932] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 00:08:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='\x00\x00t/netstap\x00') clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2cb8436828c7e6f1cd80"], 0xa}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x4) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)]) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 277.329509] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 277.355454] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:08:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000016c0)='smaps_rollup\x00') readv(r0, &(0x7f0000001700)=[{&(0x7f0000001500)=""/179, 0xb3}], 0x1) [ 277.569227] ptrace attach of "/root/syz-executor.3"[10859] was attempted by "/root/syz-executor.3"[10865] 00:08:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='wchan\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x500) 00:08:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 00:08:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 00:08:20 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x0, 0x8004}, 0x20) 00:08:20 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xf34, 0x0, 0x0, 0x8000, 0x0) 00:08:20 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000a40)=""/250, 0xffffff72) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/loop-control\x00', 0x0, 0x0) r4 = dup(r3) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x4c81, 0xfffffffffffffffe) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000003040)) restart_syscall() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003580)) r5 = accept4$inet6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c, 0x40800) r6 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x80c00) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r6, 0xc080661a, &(0x7f00000002c0)={{0x1, 0x0, @descriptor="a7109f76332e1344"}}) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000240)={r2, 0x0, 0x1000, 0x4, 0x4}) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e22, @multicast1}}, 0x0, 0x9, 0x0, "c31aadff63a9f1808ad51c032a395b4c89a36430a038b122d97cc300f73b693d27385d541a2247d14a7d6134722429c3b0c821c47ec6b48f8aa219d42e5f6c564cc8cfc1bb57a8e258e2b34ad41b84c1"}, 0xd8) r7 = socket$inet6(0xa, 0x2, 0x0) getpid() connect$inet6(r7, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x3, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r8, 0x7706, 0x0) sendmmsg(r7, &(0x7f00000092c0), 0x4ff, 0x0) 00:08:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x1000000, &(0x7f00000002c0)={[{@index_off='index=off'}], [{@obj_type={'obj_type', 0x3d, '\'trusted\\'}}]}) umount2(&(0x7f0000000000)='./file0\x00', 0xf) rename(0x0, &(0x7f0000000380)='./file0\x00') 00:08:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9fb4dde984510c82dc2b06b29e22fe2d1deeaf293028affade7c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e40f088ca1fffffff0e00000063a377fbac14140ce9", 0x0, 0x9}, 0x28) [ 278.074901] overlayfs: unrecognized mount option "obj_type='trusted\," or missing value 00:08:21 executing program 1: setsockopt$inet_int(0xffffffffffffffff, 0x1f00000000000000, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socket$inet6(0xa, 0x2, 0x0) getegid() pipe(&(0x7f0000000180)={0xffffffffffffffff}) pipe(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40000, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000100)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) symlink(0x0, &(0x7f00000003c0)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x100000000) [ 278.157411] overlayfs: unrecognized mount option "obj_type='trusted\," or missing value 00:08:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) socket$inet_udplite(0x2, 0x2, 0x88) syncfs(0xffffffffffffffff) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000000c0)=""/118) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080), 0x1, 0x0) syz_open_procfs(0x0, 0x0) 00:08:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:21 executing program 5: seccomp(0x20000000001, 0x1, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffdffe}]}) syz_genetlink_get_family_id$tipc2(0x0) seccomp(0x1, 0x1, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) 00:08:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB="6d047c2bf9c3ea370b61c0be2900000047e2252cb7a42b9abb2a2f9fb9369e0400c33f00102b0200000089da006a001496f4c8ad99b2d1b36e54e4c909c01e8c4e61f8a0e814f7e2acdd0063c7caa49d5c0600000000000000dc10000000000096b979ad81db6c0a004b59c8b042000200000000000054035ac283ff9d10385309658b8e460038e86a428657a68629594b0b63ac18fe707b2c58a17e2e5531bd6dad7cdb360f000012d455ef9724dfe23acfa22a228d51ffd86500de7c065b8cc0a7b5e7505d8e2b53d167eeff0a000c882bf3abe000ff0100000000000000eaff7f617949347f03da264228"], 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 00:08:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000012c0)=@newtfilter={0x50, 0x2c, 0x4b103aceec661403, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x20, 0x2, [@TCA_ROUTE4_IIF={0x14, 0x4, 'hsr0\x00'}, @TCA_ROUTE4_FROM={0x8}]}}]}, 0x50}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:08:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='\x00\x00t/netstap\x00') clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2cb8436828c7e6f1cd80"], 0xa}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="08dca50d5eb8cfe47bf070") tkill(r2, 0x4) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)]) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 00:08:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:22 executing program 2: accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x7f, 0x40, 0x3, 0x8}, {0x1, 0x0, 0x8, 0x3e00000000000000}, {0x0, 0x7, 0x1f, 0x3}, {0x80000001, 0x7ec3, 0x5, 0x3}, {0x100000000, 0x2, 0x8}]}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0xcb, @ipv4={[], [], @broadcast}, 0x6}, 0x1c) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 00:08:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004111, 0x0) [ 279.215195] ptrace attach of "/root/syz-executor.1"[10979] was attempted by "/root/syz-executor.1"[10983] 00:08:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:24 executing program 0: 00:08:24 executing program 1: 00:08:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:24 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)) 00:08:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:24 executing program 0: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000200)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000080)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r1, 0x0) 00:08:24 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xfffffdd2) creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8980, 0x0) [ 281.517444] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. 00:08:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:24 executing program 0: 00:08:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:24 executing program 5: [ 281.723152] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. 00:08:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:24 executing program 0: 00:08:24 executing program 5: [ 281.823675] audit: type=1804 audit(1569888504.829:91): pid=11034 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir160713038/syzkaller.ke0QF5/83/bus" dev="sda1" ino=16895 res=1 00:08:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) [ 281.969391] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. 00:08:27 executing program 1: 00:08:27 executing program 0: 00:08:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x4000000000000004) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:27 executing program 5: 00:08:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:27 executing program 5: 00:08:27 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:27 executing program 0: 00:08:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x4000000000000004) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:27 executing program 1: 00:08:27 executing program 5: 00:08:27 executing program 0: 00:08:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:27 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:28 executing program 5: 00:08:28 executing program 1: 00:08:28 executing program 0: 00:08:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x4000000000000004) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:28 executing program 5: 00:08:28 executing program 1: 00:08:28 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:28 executing program 0: 00:08:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:28 executing program 5: 00:08:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:28 executing program 1: 00:08:28 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:28 executing program 0: 00:08:28 executing program 5: 00:08:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:28 executing program 0: 00:08:28 executing program 1: 00:08:28 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:28 executing program 5: 00:08:28 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:28 executing program 0: 00:08:28 executing program 5: 00:08:28 executing program 1: 00:08:28 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:28 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:28 executing program 0: 00:08:28 executing program 5: 00:08:28 executing program 1: 00:08:28 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:29 executing program 5: 00:08:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 00:08:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140), 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:29 executing program 0: 00:08:29 executing program 1: 00:08:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:29 executing program 5: 00:08:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 00:08:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140), 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:29 executing program 1: 00:08:29 executing program 0: 00:08:29 executing program 5: 00:08:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:29 executing program 1: 00:08:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140), 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 00:08:29 executing program 5: 00:08:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160554]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000780)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:08:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000140), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 00:08:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 00:08:29 executing program 0: socket$kcm(0x2c, 0x3, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000040)='&@[\x00') socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:08:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:29 executing program 1: 00:08:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 00:08:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:29 executing program 5: 00:08:29 executing program 1: 00:08:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 00:08:30 executing program 0: 00:08:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:30 executing program 5: 00:08:30 executing program 1: 00:08:30 executing program 5: 00:08:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 00:08:30 executing program 0: 00:08:30 executing program 1: 00:08:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:30 executing program 5: 00:08:30 executing program 1: 00:08:30 executing program 0: 00:08:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 00:08:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:30 executing program 5: 00:08:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:30 executing program 1: 00:08:30 executing program 0: 00:08:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 00:08:30 executing program 5: 00:08:30 executing program 1: 00:08:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:30 executing program 0: 00:08:30 executing program 5: 00:08:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f640094000589", 0x2c}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x0, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:30 executing program 1: 00:08:30 executing program 0: 00:08:30 executing program 5: 00:08:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f640094000589", 0x2c}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:30 executing program 1: 00:08:31 executing program 0: 00:08:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x0, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:31 executing program 5: 00:08:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:31 executing program 1: 00:08:31 executing program 0: 00:08:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f640094000589", 0x2c}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x34, 0x11, 0x0, 0x0, 0x0, {@in6=@remote}, [@mark={0xc}]}, 0x34}}, 0x0) 00:08:31 executing program 5: 00:08:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:31 executing program 1: 00:08:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x28, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}}, 0x28}}, 0x0) 00:08:31 executing program 0: 00:08:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080", 0x42}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:31 executing program 5: 00:08:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:31 executing program 1: 00:08:31 executing program 0: 00:08:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x28, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}}, 0x28}}, 0x0) 00:08:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080", 0x42}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:31 executing program 5: 00:08:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@delsa={0x28, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}}, 0x28}}, 0x0) 00:08:31 executing program 1: 00:08:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080", 0x42}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:31 executing program 0: 00:08:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:31 executing program 5: 00:08:31 executing program 2: 00:08:31 executing program 1: 00:08:31 executing program 0: 00:08:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:31 executing program 5: 00:08:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd0000001000010000", 0x4d}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:32 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x14000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite\x00') r1 = geteuid() r2 = open(0x0, 0x0, 0x52) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x800, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000180)={0x90, 0x0, 0x4, {0x6, 0x1, 0x5, 0x4, 0x5, 0x15c, {0x6, 0x8, 0x7, 0xffff, 0x0, 0x88, 0x6, 0x7, 0x2, 0x1, 0x1, r1, r3, 0x7, 0x4cb}}}, 0x90) exit(0x0) 00:08:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newtfilter={0x60, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x30, 0x2, [@TCA_FLOW_EMATCHES={0x2c, 0xb, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xe9c8}}, @TCA_EMATCH_TREE_LIST={0x20, 0x2, @TCF_EM_CMP={0x1c, 0x1, {0x1}}}]}]}}]}, 0x60}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:08:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd0000001000010000", 0x4d}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:32 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)) 00:08:32 executing program 0: syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000001240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 00:08:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8b", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@newtfilter={0x38, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0xc, 0x2, [@TCA_U32_FLAGS={0x8, 0xb, 0x8}]}}]}, 0x38}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) [ 289.249055] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "" 00:08:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd0000001000010000", 0x4d}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:32 executing program 5: accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x7f, 0x40, 0x3, 0x8}, {0x1, 0x0, 0x8, 0x3e00000000000000}, {0x0, 0x7, 0x1f, 0x3}, {0x80000001, 0x7ec3, 0x5, 0x3}, {0x100000000, 0x2, 0x8}]}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0xcb, @ipv4={[], [], @broadcast}, 0x6}, 0x1c) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 289.363503] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "" [ 289.431021] protocol 88fb is buggy, dev hsr_slave_0 00:08:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8b", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:32 executing program 0: getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x100000000000025b, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2804}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) syz_open_procfs(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:08:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) 00:08:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x100004}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:08:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff00", 0x53}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8b", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:34 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) lstat(&(0x7f0000000f00)='./file0\x00', 0x0) socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xb, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="e2bcf6d35f676e4e3bf9de8af6e1b2"], &(0x7f000095dffc)=0x1) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='status\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000003c0)={0x2, 'netdevsim0\x00', 0x1}, 0x18) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r0, r2, 0x0, 0x102000002) 00:08:34 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0xfeca}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) lstat(0x0, 0x0) socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xb, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='status\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000400)={0x3000, 0x2000}) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000340)='.dead\x00', 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000003c0)={0x2, 'netdevsim0\x00', 0x1}, 0x18) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r0, r2, 0x0, 0x102000002) 00:08:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff00", 0x53}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:35 executing program 1: msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='s'], 0x1, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/152}, 0xa0, 0x0, 0x0) 00:08:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4f, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x13}], 0x1, 0x0) 00:08:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff00", 0x53}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:35 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='overlay\x00', 0x0, &(0x7f0000000580)={[{@metacopy_off='metacopy=off'}]}) 00:08:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e", 0x56}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:35 executing program 1: msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='s'], 0x1, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/152}, 0xa0, 0x0, 0x0) 00:08:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) [ 292.455755] overlayfs: missing 'lowerdir' 00:08:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e", 0x56}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/152}, 0xa0, 0x0, 0x0) socketpair$unix(0x1, 0x800000000000001, 0x0, &(0x7f00000009c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000600)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iqv\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x00\x00\x00\x00\x00\x00\x00\xae\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.g\x10H\xa8\xc9\x1f\xfc\x1e\xdfF\x16K\a@\x8c7\x1d!\xfd\xb0\xefW\x8f\xb8\x19\x8dS\xcer\x00SE\xdcD\xd2\x98\fy\x8dQ?7m\x9a\xe3\xca\xb0~\xdb*\xa7\xbf\xeftV\xa1\x94\x911\xa7\x8cYiY\xd2\xecF\xec\xb4/\xca\x97~^o\xd74\x11\'\xe1\xce\x06\xe1\xebV\xfd\xaa\x19\xd3\x14\xad\xea=o\xf2\x15g\xa9\xca\xa7\xc6\xd6\xaa\x86\xcc\x03\xcfD\xfe\x0f\xd4\xa7\x9f\xd8\n\x13T\x83\xdb\x19}\xf1\xa9\xac\x9eV\xb9\x15\x852\xfd\xaea\xff\xcb\x86d:\n\x85\x807]\x96\xb4\x96\xbc\xa6\xe6\x86\x80Gy\xfe\x8c\x1aV\xce\xb2h\xfd\xee*\xf0\xb3\xc38o\xac\x96Y\xa6\x81~\x8e\x8b@k\x7f\x88\xdd<}\x91\x83\xb0[\xff\xe3\xb9\xc6P\xd7\xc9\x87 \xef\xc9M\xa7\xbc\x1c\xa4~\x9b\xee\x94\x02&\x980\x10\x96\x96\\\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x20020102000007) ftruncate(0xffffffffffffffff, 0x0) 00:08:35 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:08:35 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) lstat(&(0x7f0000000f00)='./file0\x00', 0x0) socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xb, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="e2bcf6d35f676e4e3bf9de8af6e1b2"], &(0x7f000095dffc)=0x1) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='status\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000003c0)={0x2, 'netdevsim0\x00', 0x1}, 0x18) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r0, r2, 0x0, 0x102000002) 00:08:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e", 0x56}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@newtfilter={0x4c, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x20, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0xed}}, @TCA_U32_FLAGS={0x8}]}}]}, 0x4c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:08:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05", 0x57}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:36 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f00000003c0)="12000000a900e7ef007b1a3fcd000040e860", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}], 0x1}}], 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x23}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:08:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 00:08:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05", 0x57}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 293.320249] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=169 sclass=netlink_route_socket pig=11592 comm=syz-executor.1 [ 293.357866] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=169 sclass=netlink_route_socket pig=11592 comm=syz-executor.1 00:08:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:08:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x9}], 0x1, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) 00:08:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05", 0x57}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) 00:08:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0xff89) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 00:08:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x2, &(0x7f0000445ffc)=0x2, 0x4) getsockopt$inet_int(r2, 0x0, 0x2, 0x0, &(0x7f0000000000)) 00:08:36 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x100000000000025b, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2804}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) syz_open_procfs(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(0x0) 00:08:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000000)=0x4, 0x4) 00:08:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:36 executing program 1: r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x8927, &(0x7f0000000000)={'\x00\b\x00\xbe\xc8\xa2%R\xe9c\a\x00', @ifru_flags}) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 00:08:36 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000200)) 00:08:36 executing program 5: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() syz_genetlink_get_family_id$tipc(0x0) ptrace(0x4206, r0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f0000000240)=""/63) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000200)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:08:36 executing program 0: r0 = socket(0x11, 0x3, 0xfffffffffffffc01) recvfrom$unix(r0, &(0x7f0000000240), 0x0, 0x40012003, 0x0, 0x713) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast1}, &(0x7f0000000340)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000001c0)={@loopback, r4}, 0x14) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r5 = socket(0x9, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000380), 0x13e) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_timeval(r6, 0x1, 0x15, &(0x7f0000000000), 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f000000b680)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, {0x6, @local}, 0x62, {0x2, 0x4e23, @loopback}, 'ip6tnl0\x00'}) r8 = socket$inet6(0xa, 0x800, 0xd5b) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000440)) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) getgid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000580)=0x25f) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000780)={{{@in=@local, @in6=@initdev}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) getgid() getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in=@empty}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000000c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@multicast1, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000b80)=0xe8) getgid() ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f00000011c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001200)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000001300)=0x46c) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000003a40)) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000003a80)={{{@in=@remote, @in=@remote}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000003b80)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000003c40), &(0x7f0000003c80)=0xc) r11 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r11, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r11, &(0x7f0000000580)="240000001e001f0214f9f4ff08000000070d00"/36, 0x24) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f0000003cc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xff21) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000003e80)) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000003ec0), &(0x7f0000003f00)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000500)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x200001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r12, 0x0, 0x11, &(0x7f0000004040)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, 0x0) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000004140)={{{@in=@broadcast, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000004240)=0xe8) getgid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000004280)={{{@in=@multicast2, @in6=@initdev}}, {{}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0x484) getgid() setsockopt$llc_int(r6, 0x10c, 0x9, &(0x7f0000000040)=0x9, 0x4) sendto$llc(r6, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x200000000304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) setsockopt$sock_timeval(r6, 0x1, 0x14, &(0x7f0000000080)={0x0, 0x2710}, 0x10) recvmmsg(r6, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}, {{0x0, 0x0, &(0x7f000000c600), 0x5, 0x0, 0x0, 0x7d48bddc}, 0x100000001}, {{0x0, 0x0, &(0x7f000000c700)=[{&(0x7f000000c680)=""/90, 0x5a}], 0x1, &(0x7f0000000640)=""/16, 0x10, 0x7f}, 0x200}, {{&(0x7f000000c780)=@ethernet, 0x80, &(0x7f000000ca00), 0x0, &(0x7f000000ca40)=""/40, 0x28}, 0x206}, {{&(0x7f000000ca80)=@pppol2tpv3in6, 0x80, &(0x7f000000cd00)=[{&(0x7f000000cb00)=""/255, 0xff}, {&(0x7f000000cc00), 0x2e4}, {&(0x7f000000cc40)=""/180, 0x107}], 0x3, &(0x7f000000cd40)=""/5, 0x137, 0x2}, 0x1}], 0x5, 0x1c, 0x0) 00:08:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$KDADDIO(r0, 0x8924, 0x70e000) 00:08:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:37 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x101200, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000240)={0xb, 0x0, {0x0, 0x6, 0x0, {0x127}, {0x50, 0x1f}, @const={0x7, {0x0, 0x2, 0x101, 0x4}}}, {0x2, 0xeabd, 0x8, {0x7, 0x8}, {0x80, 0x5}, @rumble={0x91d, 0x1000}}}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) fchdir(0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./file1\x00', 0x500, 0x120) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='setgroups\x00') write(r3, 0x0, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setown(r2, 0x8, r4) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x528, 0x200, 0x7}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setregset(0x4205, r0, 0x1, 0x0) unshare(0xa79e05eae29cef91) socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = open(&(0x7f0000000140)='./bus\x00', 0x14103e, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) getsockname$unix(r7, &(0x7f0000000300), &(0x7f00000001c0)=0x6e) 00:08:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:37 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000540)=@generic) read(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000580)=ANY=[@ANYBLOB="5c02000000000000040101c910f0010000000000000000000000000001000000bb4d9c7655c3fb08961f4b700c0388c19ebf2a60b24f10ff2c205a6a91e03e9e547147ddb4"], 0x1) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000380)) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40047602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000480)='./file1\x00', 0xa) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000a40)="04a2dfaa525db297f33d326444fe84775130148b6858ed0e8846e9753114a2c3d092a0079f99086bd393a375078d01324f5fb6796427ba795109b08a6dda0781189efe634a447793ceca4b79961760018522bb8346a2b0cdbdf60fb983d4bc746f472c5443486ae7a3a862ef52400a0997c3f1335e3ff895c294d40bf393f12051e661372dc26eee566904b57bc9224cad7e40b8c86ed8fa2be2dbffc5df958d261588ea9236b5651293a3de53b8150c86ef5e2855d1d59eb264c103378f57c69fa30b95ce1fe6fadae4e31107a132611867a0e85790c7c099962c52244c93ac6506d21e004e543619d77dc6e70c99f7b65a626c4dfeb5a0f2eaae5fbcdca82507167d426f65b8a9f3e7e9215899dc21b53723a8a6dec788e39b9c39e39964cf7b145a0fdebbed00e53a891eff3e8a84d6883dbd4dc1a4b339eaba7c72ba5e34d86800def2c1cc602ea34e69742b90117c97b1afe21f0d36a82eee9df97a99271469f91f719e310a10bb2687b4356262d6c6f829ed003f112f85664621b27e5e24a6b8719a5d29e18c4fbdf19c2607e2cc7c2f26fd1564c73adc50f53ff3f8b64289519f7f2cd5312bd5809ebf8fd323c79228923f9caa92f9052a79a7bd23425e97b77fb1abf4fab671ad801010069d5ade1d3ccb421f4bc68467c899a6f66eeb9b5594b2b596b614b3c81d46690b418d682cf1bb6c3db8333e391268d950cac6a576ef984f9a554d313d6d965b0c2954b4ad56ffd5555c0a74df8829e9c13d98332901f83ad4fe02e9c9cc9be4e50be5899dcc25cac4a622d952c86ce5ae85add51d4d48b1c05cb60c449bcbed299459438b0f01e361af3a61eb4ae763f194b45b41040c95b60174da92329b7ef1ea5829f562785eacba50f931589c57f933f577cd98c2f66b13a5d3fa6ed323e4cdbddb201d9854d77aeb3cd92acba3a71f80cae0796a74a933918556e60ca0f57ed8fd0d98422ff993273a8f04737c04426af4e66cdaa9844e3a5bf57cb9b1c6bb0650cb15bea940b78f8b7da01402315883bc154afe3a3075b5cb39e392bbf3a4ec2c531d038bb0c299efb28efcdbf631571553be2871d2504cd71d8dcb7ee5d7ba24cecbc06ded4db90e3474fcee22abcd5f4a7b75e6d02f41ed86e6295b4adaa5381c8092bffb6d942f3bee192f914b11b8a79e1a7a01de7e9fa039d505dc65df0f426a4bfd52b347656b0178731330aad685fb75b98d5596248243e3c485a6cbd704e8e3d41d9a9c111475ccff4e6cffb238d31e665f92f4d918319627dbd0bc32341b5a67aaa4fd5f506d283257bc35beb912de64b5051e39a64d555bb424b7327ac29978ab51617f235061a6c70ae8d21d7f36733a0a4f4ec24339d5dedb09621dd36c1abbb4d3a1a1172f380feb62bec16573e88bcd064c7c19c61be4fdd5b3e2136063016a5106c079d78b72352e3eccd34ad9bddb981a8e721ecffebec380a8925bd303cb567650c44befc0446e71a37f76b567a4bf668e4584038b7d8aea9c15bd943297b3a9b6208d1fca3675facdcf3529760f215d4c815724701eb43da9630a5832341cb8b2081225d0a20a56ffdbbae6529fe484d2015c859d67e5572c85d0ca1697c976acac2ca5021ddaf5d9fc22b8d31f8366ddb05ab10a33f69d7e5e9ee20c816c47a2841645ac88a6d9807dcd1ac460b042fb1b5a51c6b000c1cdbaf64014f06609838eb046ef6880f93786574f7a202cf3b2bfce53901f33dd3496dde32d8a0480a75e9a3309d452d7fbe0cad82d6087ce0f753a1306cdc682dc59ba4a627609df7647bd6e3a65c8b52c4d88099693f0a8eccd19cc094b333bd60e03436ce415271e01ee231268b3a9ec823cdf213e274bf20a7612aac69439876229b76cf62f3c07a247b65b0f3a9f359b50ed0ae762ec8c48db80c4b762c918d05ae5ec10ffd3ec495d4e55c83407fcd1d5dda97e0b39457d87f7fd8ac7d821bf48a8330cad18f8cff07f316bc72fd2a26ba1fa5785505cd607777fa756f7766cbc1e26684ebf54f7dfebfd1ceb9e3b99d89fc08a210c80778af3aa8c98e944cc7a1fcd0bc61c43748f6d81708786bc42738396ab14e94d665235edbb4084e11a5b75e9173140697ebf1cc090d26bb152fc3d7522641db13d857604c50786f25547747d2bc0d83b37a792d03c8b8094bbbe6f5081afb02ccba27193f2984277c6c6345bf71313f84e73e0d7f11e51ba0c813d4dbb33d86b58d7cdfe1bcbd07d599cf893f5e0c963214285fd0c85559ffa4ab4847242ab56cebd2bb431c21db396fe51585ced236663d34eb6f2f52f9c62a917c0842a8d460b185b0d1848dc9a57a4d9a8fff55cfe906c473c6bfc6a589874af4cf3733c5d7dd27cfdbb55634590369d38ae003c70eaf6d2adf5a223c6ab95332e47c59b41ac1c500ab15a950245f20bd4dd42d315929d5a96b4e297c4ffb2cdbeb190991da0f92cd567c7b30c8d0d8a1b6021c195790b5553c8b01a8104d22e946d7d0ff1c330ca50b62d51c9503508bfe16907a2c88332ffaa9f8803bf6f0bd52e6dbbf496896d43d1fd593b8bfcd35fb78a323fdd1292da13ebcfc9cf15405587ebc6d2c7a103000acf52e798efafc8523bda36068ce0a250f2c6b14732c9591bc3f03e9e354952c48f61af5944ad2b8e51b8f3143df8917ce6ef6a3c9f94e54804daf07f30dd99ea2ecc3d9fa616fcd6ac488f352e2ac4c0c2355ed636c617d04be76674a2170ed0a583cd8150e1a67c307adea4342e8b375b8bfe957e41859b9b8d854b6aba8910bebaf4219182432e1bb2e49efa72183eb85667d7239b8ae01688519c8a9ae55e8d04570ca7e6da6cc989680e202a979c969a56772e07e1a1b07e979df18bfca9bf26863e22f996e32dd207d0af2de63c5568eaa2eff693e0ede97e2cbc2dbe9893e3547edf3d179b4ab02f83040bdeca58ba9caf0e927f74a1d7999113004d1b98cce92544ff5787c8554491e36194d37681a5e4d665d12d6fed18bc7d90a6a9d7e51cf8bcaff419f3ff27e6300685de45231d6ec8952eda3f7e849585d0ea29bf5eb53171fa8cf85cfd28635f07cfb83be9d8bfdcf4d130af18a166032d468f913f8ffbcfc9bbf899ae09a9faa0239326447e1736d453e92886499cd0e85f4e540e21fce7d69d72be01f1599a21ac7f3f5a1d9d3852066dbb61bdfcfa078b611a52ad0bb0cc9a7f3c1518bde4c605e2c9e59dccbcf4d94da827063b8a1de5ed00dc2b8d1567b5e2dd20688d709e809ecc85d21c7150405c7e6f7f2321b9de40d157aeddaec4d3d6b4037c1b8753e2a03058e2074c9eeea734675129b0d972a67e6447a9392af2a0353751a5e666c8fd351ad0bc54d96dd596ba18755b3418c12440d1dbed96463b3411b59bee7d3a4531dba58c0491dd62d5e795b15474d7833780af1942284cb90d7e5c972860e4d5f8892dcb72c68278be2fc4ca6760129e0b2382c86ea5460d0be51f2d47a57d38564286c1c528e47fe8d74c3ef24c65b2f5d69ec3c56163a5a21b9b87956265463dbf4bc091cc1fa14daf802136340bdb4b7dfac3b43529b3b64b96ec27bec84d977929e3d2c89ce567a389bbd4f297ab659667edad637009c887cc3a6a15544078fe71a9ce9b02506f636cd347f9ae3e59c1a6649eb47e5b0f620e79953af79796382ed17838a4ea5e059f06b56db16fa588648aee260ab8309d76715347750941d4dc75b11acba21fccd54230e3108723bc58f2b5ebbd9ba89e8ac7a342706d290fe2c1d180773424b33d71c9ac15ce29865984c91b2d2713056b9abc323f2f3dd32fbdacc19ced91a70f6f97757c7da2e2ae72cbca4d4bcd03c0a82bfb33881fb107582d40d2b5fb23a29dbded4f541d733b4370ba41d87f10bd7d45782baad613456758f43ca22326b120577f8b24a4f3f1bcbb1ec47c9e7612df2905ec47c4243cd7b78665d8cc57b19a196d4e598c2675f8ad8ec03594714c835cf886beefe4ae9dc1014c999011249d23ca64a94f9afb59806b0ec15160bc06f4f478ed99765fdfb6a5223abdcc5f0881209b12ea4444df9d12b8e0ff77c384cdbb4f7a554254217ec773b3e037d9008e393575e56c61f2dd67fda9c3875945e1b182dd0cf6d8c943f6473b0b27c2ac81818242c4d7ec9085a5562b37a1cfc5c5ab4d46260b8da622b7c3628f642e1b732fd8bd93847c69e89f62d124e24df6d65f72b197729f024c38a0e405e6781cdc43bc57c8f18cf4ee747b06c6b1bf901af833812fc2ff40d44e1c17c014c111f11cfb622b852c878fa4ad4a207fbdd9813c5584add2be63823e9683ab63407a403ba4f76a46ecab7cfe9470beeb85f94096a6a49c13e83a21920da90ce1af3fd0c2ab7b948ea773fe24a6eeb52b98b9008810a1689a5b8c25a00d5b71d182f33bffcfc46a943a1314e059d88653b887c7496e338c132816a739f82084893397766566b510bd2f0284efd13b3aac724316e379ae745716308de0b86c0c2f5aa13e8ff0db9eb35a777ec252569e19a158e67919197af3a964c9298fb531d7a88432761bf3ce8b967bcc2d70f40005d58263e93819926ffa2e84b342819ef9257edae6e6966ef06555ed09d4488290ad1b5f4db1e666abb25e7565a9a0ba0423883d30c65c078947c85b02752f1c2bae7e44304c38355b43d9482c923ef130ef554efdb9f7675c44892dd08963866c0b6b7574c4c4a8729e1aeb4eb38f94608842e78febc317d75659f4636a8db9ca5ef4b8fb6c828ed9f5ff673bc6ca15664cf0398badb4945a5716aaea1cacd283b1acf9274793e8a76bf2997ab8253038eed1f515a3fa5a010cd5a5686f8d91d10d8f8ffc235699bf5af103d089624d5f4a950d7a8cc94870b1969b9ba209cdc8354f96b77d8a52fd92101ca0fd0f23fe222278828c035ebfd24777810a8f2cf45b764081f0713523ac154340e1502bd90564bb985f1e86f461d795815c0509f83f072f5cc3f38d46b9a94b3545df70453c2f9de28f75be533b3703cc91e04289c9e8348b76ed68952f6a801f6504944b4722ad1deedfbdb2c42b78aafeb7213e26c6b4c1af5169065e91c2ceb58e49ff88e7af32cc8cb535668d8e67557a4053f1a33a1a111b8617172ba7107a2aa17bdc5011b35d9808bb6085a41585e74ad340ce2d8e105a8753bdda54416dc70f12fef2e89d1fb1dad452e7f02deb7710b6312e689bba3f0d423c2e67b3117b6e4110de513b78b7e540335916aabf3e8ee6184a1d1d1cf563a3fcd637a9f713db4fbb704e657be81e8c10a7f175798363dc85ea6ce7b5181786d6798170a18f185f8cd2dba736012e64253004157c1cfd9d1c1c473546d3769c24efb84dee683464997d96203862a7e7be386b9d8ce3f8119d22a8b7fb0a6867b705619381c2b8ea0dfb5e4f7e4478fe11fc98f013650a6acdaa0be537814fb8e049dfba2c9cb147bc01ac9b581d41cf5b4c9a9616381ef71be734601932376793dbf337080f7e63dc2fd3017719a5cedf732d1c40975650f920815dec93f34b95a9b13753761739288fcbe78677b7ccdcebaadea4f4331a7e7366ac61c72479ef3e35a4bd80d899f818be545fd217639c3091d140cb46cd36c9d9bebd06"}, 0x20) fcntl$setstatus(r2, 0x4, 0x6100) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RLOCK(r3, &(0x7f00000009c0)={0x8}, 0x8) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) r6 = epoll_create(0x4000c) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000000240)={0x14}) ppoll(&(0x7f0000000140)=[{r6}, {r4}], 0x2, 0x0, 0x0, 0x0) epoll_wait(r6, &(0x7f0000000200)=[{}], 0x1763, 0x47) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r5) sched_rr_get_interval(0x0, &(0x7f0000000500)) 00:08:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) [ 294.141222] sp0: Synchronizing with TNC [ 294.210458] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 00:08:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:08:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{0x0}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) [ 294.965335] audit: type=1804 audit(1569888517.969:92): pid=11730 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir160713038/syzkaller.ke0QF5/119/file1" dev="sda1" ino=16967 res=1 [ 297.166807] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.173797] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.102367] device batadv0 left promiscuous mode 00:08:44 executing program 0: 00:08:44 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x406, r1) readlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000400)=""/242, 0xf2) socket$inet(0x2, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000340)=ANY=[@ANYBLOB="0202200313000000000000ffff00ff0005000600571866720a000068c3f2b5359eed8104200000005500000000000000000000000000000005000900df0000002a00002000000000fe8000000000000007000000000000ff00000000000000000200010000ffff000000050d0000001005000500eb0000000a00000000000000ff020000000000000000000008f500010000000000000000"], 0x98}}, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f000023b000/0x2000)=nil) getpgid(0x0) personality(0x0) umount2(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) 00:08:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newtfilter={0x58, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x28, 0x2, [@TCA_FLOW_EMATCHES={0x24, 0xb, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xe9c8}}, @TCA_EMATCH_TREE_LIST={0xc, 0x2, @TCF_EM_IPSET={0x14}}]}]}}]}, 0x58}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:08:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{0x0}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) [ 301.500326] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 301.520103] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 301.546538] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.597589] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 301.613423] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.660818] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 301.685015] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:08:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{0x0}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:44 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) syz_genetlink_get_family_id$team(0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r3, 0x0, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) getsockopt$inet6_mreq(r1, 0x29, 0x0, 0x0, &(0x7f0000000380)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) r5 = syz_open_procfs(0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xdd) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r6}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) syz_open_procfs(0x0, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000001900)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2000}, 0x4000000) syz_genetlink_get_family_id$team(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x4d}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000800)) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001d80)={{{@in6=@ipv4={[], [], @initdev}, @in6=@remote}}, {{@in=@local}}}, &(0x7f0000001e80)=0xe8) syz_genetlink_get_family_id$team(0x0) r7 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getpeername$packet(r7, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) syz_genetlink_get_family_id$team(0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r8, r8, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f00000002c0)={0x0, 0x6, {0x0, 0x2, 0x0, 0xe05f8c68f812d071, 0x5}}) syz_genetlink_get_family_id$team(0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) r10 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) r11 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4000000) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000002600)) syz_genetlink_get_family_id$team(0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) syz_genetlink_get_family_id$team(0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r12, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r13 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40) 00:08:44 executing program 1: 00:08:44 executing program 0: 00:08:44 executing program 4: [ 301.746097] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 00:08:44 executing program 0: 00:08:44 executing program 4: 00:08:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:44 executing program 5: 00:08:45 executing program 1: 00:08:45 executing program 0: 00:08:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:45 executing program 4: 00:08:45 executing program 2: 00:08:45 executing program 5: 00:08:45 executing program 1: 00:08:45 executing program 0: 00:08:45 executing program 4: 00:08:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:45 executing program 4: 00:08:45 executing program 5: 00:08:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630d", 0x20}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:45 executing program 0: 00:08:45 executing program 2: 00:08:45 executing program 1: 00:08:45 executing program 0: 00:08:46 executing program 5: 00:08:46 executing program 2: 00:08:46 executing program 4: 00:08:46 executing program 1: 00:08:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630d", 0x20}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:46 executing program 0: 00:08:46 executing program 5: 00:08:46 executing program 4: 00:08:46 executing program 2: 00:08:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630d", 0x20}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:46 executing program 1: 00:08:46 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0xfffffffffffffffd, &(0x7f00000019c0), 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000001440)={0x7}, 0x7) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140)={0x1f, 0x3, {0x0, 0x4, 0x9, 0x0, 0x0, 0x1f}, 0x3}, 0xe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x800) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x1ff, 0x2, 0x5ee, 0x7f, 0x8}) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) io_setup(0x2344, &(0x7f0000000100)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x3000000, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) fdatasync(0xffffffffffffffff) r3 = creat(&(0x7f0000000200)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f00000003c0)={0x1}) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000000140)="99", 0x1}], 0x1, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000240)={0x6, 0x1f, 0x6, 0x101, 0xee4a, 0x7fff}) r4 = creat(&(0x7f0000000200)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f00000003c0)={0x1}) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000140)="99", 0x1}], 0x1, 0x0) fchmod(r4, 0x0) mmap$perf(&(0x7f00009ba000/0x600000)=nil, 0x600000, 0x0, 0x591241733affbc1f, r4, 0x0) 00:08:46 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x9f) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 00:08:46 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000001900)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={0x0, 0x0, &(0x7f0000002200)={&(0x7f0000000940)={0x174, 0x0, 0x0, 0x0, 0x25dfdbfe, {}, [{{0x8}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x88, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x174}}, 0x4000000) getsockopt$inet6_mreq(r1, 0x29, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@dev, @in=@empty}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000580)=0xe8) syz_genetlink_get_family_id$team(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000800)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) getsockname$packet(r2, 0x0, &(0x7f0000000780)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001f40)={{{@in=@initdev, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000002040)=0xe8) r5 = syz_genetlink_get_family_id$team(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r6, 0x0, 0xdd) getpeername$packet(r6, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, 0x0) r7 = syz_open_procfs(0x0, 0x0) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x0, r8}) r9 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002200)={&(0x7f0000000940)={0x40c, r5, 0x800, 0x70bd2c, 0x0, {}, [{{0x8}, {0x178, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0xb0, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r10}, {0x78, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x138, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}]}}]}, 0x40c}, 0x1, 0x0, 0x0, 0x2000}, 0x0) syz_genetlink_get_family_id$team(0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r12, 0xffffffffffffffff, 0x0, 0xdd) socket$inet(0x2, 0x1, 0x0) syz_genetlink_get_family_id$team(0x0) r13 = syz_open_procfs(0x0, 0x0) sendfile(r13, 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2}) accept$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r14, r14, 0x0, 0xdd) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xdd) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40) 00:08:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e23", 0x30}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:46 executing program 4: ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000001780)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000005c0)=""/4096, 0x1000) 00:08:46 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0xffff) fcntl$addseals(r0, 0x409, 0x8) [ 303.430625] protocol 88fb is buggy, dev hsr_slave_0 [ 303.435768] protocol 88fb is buggy, dev hsr_slave_1 00:08:46 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffed7) 00:08:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e23", 0x30}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f00000002c0)={0x10, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}}) 00:08:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr}}) 00:08:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e23", 0x30}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000000c0)={0x3f, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x104) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000042c00) 00:08:46 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffed7) [ 303.917122] ptrace attach of "/root/syz-executor.1"[11928] was attempted by "/root/syz-executor.1"[11929] [ 303.990626] protocol 88fb is buggy, dev hsr_slave_0 [ 303.996254] protocol 88fb is buggy, dev hsr_slave_1 00:08:47 executing program 5: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fdatasync(r0) [ 304.295431] print_req_error: I/O error, dev loop0, sector 0 [ 304.302619] print_req_error: I/O error, dev loop0, sector 0 00:08:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$key(r0, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0200000000d72cb6c562c200a5bc50ca362c8123c3bd06a4ff00"/35], 0x25f}}, 0x0) 00:08:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09", 0x38}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/create\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) 00:08:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 00:08:47 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffed7) 00:08:47 executing program 5: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fdatasync(r0) [ 304.455299] print_req_error: I/O error, dev loop0, sector 0 00:08:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09", 0x38}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:47 executing program 5: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fdatasync(r0) [ 304.487262] audit: type=1400 audit(1569888527.489:93): avc: denied { write } for pid=11955 comm="syz-executor.2" path="socket:[42289]" dev="sockfs" ino=42289 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:08:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000108], [0xc1]}) 00:08:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback, 0x0, 0x33}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 00:08:47 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) [ 304.637193] print_req_error: I/O error, dev loop0, sector 0 00:08:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09", 0x38}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:47 executing program 5: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fdatasync(r0) 00:08:47 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) fdatasync(r0) 00:08:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x8) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 00:08:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306", 0x3c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:47 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) [ 304.835770] print_req_error: I/O error, dev loop0, sector 0 00:08:47 executing program 5: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x0) fdatasync(r0) [ 304.906572] print_req_error: I/O error, dev loop0, sector 0 [ 304.921630] print_req_error: I/O error, dev loop0, sector 0 00:08:47 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:08:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newqdisc={0x58, 0x24, 0x511, 0x0, 0x0, {0x0, r1, {0x0, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) 00:08:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000001], [0xc1]}) 00:08:48 executing program 2: syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$TIOCLINUX2(r0, 0x541c, 0x0) creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6900) ftruncate(0xffffffffffffffff, 0x800) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000004c0), 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r1, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) fcntl$setlease(r2, 0x400, 0x0) syz_open_dev$loop(0x0, 0x7, 0x182) 00:08:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306", 0x3c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) [ 305.109273] print_req_error: I/O error, dev loop0, sector 0 00:08:48 executing program 5: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) fdatasync(r0) [ 305.197774] audit: type=1804 audit(1569888528.199:94): pid=12026 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir307533647/syzkaller.mqyu3f/130/bus" dev="sda1" ino=17005 res=1 00:08:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={0x0}) 00:08:48 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0x40085400, &(0x7f0000000000)) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:08:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306", 0x3c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) [ 305.303608] print_req_error: I/O error, dev loop0, sector 0 00:08:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655", 0x3e}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:48 executing program 5: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fdatasync(0xffffffffffffffff) 00:08:48 executing program 5: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fdatasync(0xffffffffffffffff) [ 305.624480] audit: type=1804 audit(1569888528.629:95): pid=12054 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir307533647/syzkaller.mqyu3f/130/bus" dev="sda1" ino=17005 res=1 00:08:49 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:08:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655", 0x3e}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:49 executing program 5: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fdatasync(0xffffffffffffffff) 00:08:49 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r1 = inotify_init1(0x0) r2 = dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0xa224930610d2bc7) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f00009fd000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) open(&(0x7f00003f5000)='./control\x00', 0x0, 0x0) 00:08:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) fdatasync(r0) 00:08:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655", 0x3e}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000100], [0xc1]}) [ 306.181140] print_req_error: I/O error, dev loop0, sector 0 00:08:49 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = memfd_create(&(0x7f00000000c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fsetxattr$trusted_overlay_nlink(r0, 0x0, 0x0, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x8) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 00:08:49 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r1 = inotify_init1(0x0) r2 = dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0xa224930610d2bc7) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f00009fd000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) open(&(0x7f00003f5000)='./control\x00', 0x0, 0x0) 00:08:49 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) fdatasync(r0) 00:08:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6", 0x3f}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:49 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r1 = inotify_init1(0x0) r2 = dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0xa224930610d2bc7) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f00009fd000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) open(&(0x7f00003f5000)='./control\x00', 0x0, 0x0) 00:08:49 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000002c0)) ptrace(0x10, r0) ptrace(0xffffffffffffffff, r0) 00:08:49 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) fdatasync(r0) 00:08:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6", 0x3f}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:49 executing program 0: ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 00:08:49 executing program 4: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x40000000, @rand_addr="0000e5ffff09ff0000000000efff00"}, {0xa, 0x0, 0x0, @remote}}, 0xfffffffffffffe30) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x3) 00:08:49 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r1 = inotify_init1(0x0) r2 = dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0xa224930610d2bc7) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f00009fd000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) open(&(0x7f00003f5000)='./control\x00', 0x0, 0x0) 00:08:49 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) fdatasync(r0) 00:08:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "6c48a3", 0x14, 0x82f, 0x0, @dev, @dev, {[], @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:08:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6", 0x3f}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 00:08:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3) 00:08:50 executing program 5: syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 00:08:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) 00:08:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="40000000240011f3ff00"/20, @ANYRES32=r1, @ANYBLOB="0000ffff000000000000000014000100706669666f5f686561645f64726f70000800020000000000"], 0x40}}, 0x0) 00:08:50 executing program 5: syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 00:08:50 executing program 4: openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) 00:08:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000000000000000000080009000d000000", 0x24) 00:08:50 executing program 2: 00:08:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg$key(r0, &(0x7f0000000000)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0200000007002c00001a000017a667beda8e44a6"], 0x2a1}}, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getgroups(0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) 00:08:50 executing program 5: syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 00:08:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x2, 'bridge_sl\tve\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 00:08:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:50 executing program 0: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:08:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newtfilter={0x58, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x28, 0x2, [@TCA_FLOW_EMATCHES={0x24, 0xb, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xe9c8}}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, @TCF_EM_IPSET={0x14, 0x1, {0x0, 0x8, 0x0, 0x0, {0x7ff}}}}]}]}}]}, 0x58}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:08:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x2, &(0x7f000079bffc), &(0x7f0000000000)=0x4) 00:08:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000003], [0xc1]}) 00:08:50 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff6c9) prctl$PR_SET_ENDIAN(0x1e, 0x0) 00:08:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 00:08:50 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000b00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 00:08:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/vhci\x00', 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg$unix(r0, &(0x7f0000003d00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r2]}}], 0x30}], 0x1, 0x0) 00:08:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xc018aec0, &(0x7f0000000100)={0x300, 0x0}) 00:08:50 executing program 2: 00:08:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 307.961863] input: syz1 as /devices/virtual/input/input6 00:08:51 executing program 2: 00:08:51 executing program 1: 00:08:51 executing program 5: [ 308.079434] input: syz1 as /devices/virtual/input/input7 00:08:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x0) fcntl$addseals(r0, 0x409, 0x8) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 00:08:51 executing program 4: r0 = accept$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000002c0), 0x8) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000003dc0)=0x3f) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000}, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) 00:08:51 executing program 0: 00:08:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 00:08:51 executing program 1: 00:08:51 executing program 5: 00:08:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580), 0x0, 0x0, 0x0) 00:08:51 executing program 0: 00:08:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x0) fcntl$addseals(r0, 0x409, 0x8) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 00:08:51 executing program 1: 00:08:51 executing program 5: 00:08:51 executing program 0: 00:08:51 executing program 5: 00:08:51 executing program 4: r0 = accept$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000002c0), 0x8) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000003dc0)=0x3f) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000}, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) 00:08:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580), 0x0, 0x0, 0x0) 00:08:51 executing program 1: 00:08:51 executing program 2: 00:08:51 executing program 0: 00:08:51 executing program 5: 00:08:51 executing program 1: 00:08:51 executing program 0: 00:08:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580), 0x0, 0x0, 0x0) 00:08:51 executing program 2: 00:08:51 executing program 5: 00:08:51 executing program 1: 00:08:52 executing program 4: r0 = accept$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000002c0), 0x8) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000003dc0)=0x3f) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000}, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) 00:08:52 executing program 2: 00:08:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:08:52 executing program 0: 00:08:52 executing program 5: 00:08:52 executing program 1: 00:08:52 executing program 2: 00:08:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:08:52 executing program 5: 00:08:52 executing program 0: 00:08:52 executing program 2: 00:08:52 executing program 1: 00:08:52 executing program 4: r0 = accept$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000002c0), 0x8) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000003dc0)=0x3f) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000}, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) 00:08:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:08:52 executing program 5: 00:08:52 executing program 0: 00:08:52 executing program 1: 00:08:52 executing program 2: 00:08:52 executing program 0: 00:08:52 executing program 5: 00:08:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}], 0x1}}], 0x1, 0x0, 0x0) 00:08:52 executing program 1: 00:08:52 executing program 2: 00:08:52 executing program 5: 00:08:52 executing program 4: 00:08:52 executing program 1: 00:08:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}], 0x1}}], 0x1, 0x0, 0x0) 00:08:52 executing program 0: 00:08:52 executing program 5: 00:08:52 executing program 2: 00:08:52 executing program 4: 00:08:52 executing program 0: 00:08:52 executing program 1: 00:08:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}], 0x1}}], 0x1, 0x0, 0x0) 00:08:53 executing program 2: 00:08:53 executing program 0: 00:08:53 executing program 4: 00:08:53 executing program 5: 00:08:53 executing program 1: 00:08:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) 00:08:53 executing program 5: 00:08:53 executing program 2: 00:08:53 executing program 4: 00:08:53 executing program 1: 00:08:53 executing program 0: 00:08:53 executing program 2: 00:08:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) 00:08:53 executing program 1: 00:08:53 executing program 4: 00:08:53 executing program 5: 00:08:53 executing program 0: 00:08:53 executing program 2: 00:08:53 executing program 4: 00:08:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/60, 0x3c}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) 00:08:53 executing program 1: sched_setattr(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de087185082cf1624b0eba06ec4a86e8f32e00586f9835b3e00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:08:53 executing program 0: 00:08:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x1, {{0x2, 0x0, @multicast1=0xe0000300}}}, 0x88) 00:08:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) r2 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0xe6) r3 = socket(0x1, 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r4}, 0x80, 0x0}}], 0x300, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)={0x198, r2, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8}, {0x17c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x210}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x83}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}]}, 0x198}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000000) write$P9_ROPEN(r0, 0x0, 0x0) 00:08:53 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000200)=""/100, 0x64) read(r0, &(0x7f0000000400)=""/100, 0xfffffd61) 00:08:53 executing program 0: 00:08:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000800)=""/46, 0x2e}], 0x1}}], 0x1, 0x0, 0x0) 00:08:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newtfilter={0x3c, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0xc, 0x2, [@TCA_FLOW_BASECLASS={0x8}]}}]}, 0x3c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:08:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newtfilter={0x60, 0x2c, 0x701, 0x0, 0x0, {0x0, r2, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x30, 0x2, [@TCA_FLOW_BASECLASS={0x8, 0x3, {0x4}}, @TCA_FLOW_EMATCHES={0x24, 0xb, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xe9c8}}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, @TCF_EM_IPSET={0x14, 0x1, {0x89}}}]}]}}]}, 0x60}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x332, 0x0) [ 310.863564] IPVS: ftp: loaded support on port[0] = 21 00:08:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newtfilter={0x40, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x10, 0x2, [@TCA_FLOW_EMATCHES={0xc, 0xb, [@TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x40}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) [ 310.930434] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=33 sclass=netlink_tcpdiag_socket pig=12443 comm=syz-executor.2 00:08:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000800)=""/46, 0x2e}], 0x1}}], 0x1, 0x0, 0x0) 00:08:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000002c00010700"/20, @ANYRES32=r1, @ANYBLOB="000000000000000006000000080001006270660010000200080004000000000004002500"], 0x3c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) [ 311.098367] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=33 sclass=netlink_tcpdiag_socket pig=12455 comm=syz-executor.2 00:08:54 executing program 0: 00:08:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000800)=""/46, 0x2e}], 0x1}}], 0x1, 0x0, 0x0) 00:08:54 executing program 1: 00:08:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000040)={0x0, 0x7}) [ 311.281659] IPVS: ftp: loaded support on port[0] = 21 00:08:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newtfilter={0x58, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x28, 0x2, [@TCA_FLOW_EMATCHES={0x24, 0xb, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, @TCF_EM_IPSET={0x14, 0x1}}]}]}}]}, 0x58}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:08:54 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) 00:08:54 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40046f41, 0x760030) 00:08:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{0x0}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newtfilter={0x60, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x30, 0x2, [@TCA_FLOW_BASECLASS={0x8, 0x3, {0x4}}, @TCA_FLOW_EMATCHES={0x24, 0xb, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xe9c8}}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, @TCF_EM_IPSET={0x14, 0x1}}]}]}}]}, 0x60}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 00:08:54 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) lstat(&(0x7f0000000f00)='./file0\x00', 0x0) socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xb, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="e2bcf6d35f676e4e3bf9de8af6e1b287e8c72722519da72a2db6d0"], &(0x7f000095dffc)=0x1) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='status\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000400)={0x3000, 0x2000}) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000003c0)={0x2, 'netdevsim0\x00', 0x1}, 0x18) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r0, r2, 0x0, 0x102000002) 00:08:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{0x0}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newtfilter={0x3c, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0xc, 0x2, [@TCA_FLOW_BASECLASS={0x8, 0x3, {0x4}}]}}]}, 0x3c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) [ 311.488852] audit: type=1400 audit(1569888534.489:96): avc: denied { map } for pid=12487 comm="syz-executor.0" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=16379 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file permissive=1 00:08:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 00:08:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:08:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x22d, 0x20048ff2, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000fffffffe) r3 = getpgid(0xffffffffffffffff) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f00000006c0)={0x6, 0x0, r3, 0x0, r4, 0x0, 0x8, 0x20}) fdatasync(r1) 00:08:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b3b6ec8baa", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="de183a2c443f898d3b5490fda99ae4d78c5788469a2a131cf14b9dc969b6630dd23fdbc076abb1edeb59ca33c27a9e2371d5f4f5bd086d09c8d70306e655e6ff", 0x40}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000940)=[{0x0}, {&(0x7f0000000800)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, 0x0) 00:08:54 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/152}, 0xa0, 0x0, 0x0) 00:08:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f00000003c0)="12000000a900e7ef007b1a3fcd000040e860", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}], 0x1}}], 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x23}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:08:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee"}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb], 0x12000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:08:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newtfilter={0x58, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x28, 0x2, [@TCA_FLOW_EMATCHES={0x24, 0xb, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, @TCF_EM_IPSET={0x14}}]}]}}]}, 0x58}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) [ 311.879111] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=169 sclass=netlink_route_socket pig=12535 comm=syz-executor.2 [ 311.968027] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=169 sclass=netlink_route_socket pig=12535 comm=syz-executor.2 [ 311.999475] kvm [12541]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f [ 312.016553] kvm [12541]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f [ 312.038609] kvm [12541]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f 00:08:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg$key(r0, &(0x7f0000000000)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0200000007002c00001a000017a667beda8e44a6"], 0x2a1}}, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) 00:08:55 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x7, 0xc0ffffff}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 00:08:55 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAP\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\xc9t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r0, 0x0, 0x7) [ 312.080778] kvm [12541]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f 00:08:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0x40000100], [0xc1]}) 00:08:55 executing program 0: r0 = socket(0x40000000015, 0x40000000000005, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 00:08:55 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAP\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\xc9t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r0, 0x0, 0x7) 00:08:55 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) syz_open_pts(0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) fcntl$setlease(r2, 0x400, 0x0) 00:08:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0x40000001], [0xc1]}) 00:08:55 executing program 2: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") readv(r0, 0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000001, 0x8031, 0xffffffffffffffff, 0x0) clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000861000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000273000/0x2000)=nil, &(0x7f00005b2000/0x3000)=nil, &(0x7f00003d3000/0x3000)=nil, &(0x7f00002e7000/0x1000)=nil, &(0x7f00003c0000/0x3000)=nil, &(0x7f0000107000/0x3000)=nil, &(0x7f000049c000/0x2000)=nil, 0x0}, 0x68) 00:08:55 executing program 1: memfd_create(0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x760030) 00:08:55 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) [ 312.563785] audit: type=1804 audit(1569888535.569:97): pid=12579 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir134261732/syzkaller.qGMibt/185/bus" dev="sda1" ino=17038 res=1 00:08:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00\f\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newtfilter={0x60, 0x2c, 0x701, 0x0, 0x0, {0x0, r2, {}, {}, {0x6}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x30, 0x2, [@TCA_FLOW_BASECLASS={0x8, 0x3, {0x4}}, @TCA_FLOW_EMATCHES={0x24, 0xb, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xe9c8}}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, @TCF_EM_IPSET={0x14}}]}]}}]}, 0x60}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x332, 0x0) [ 312.672961] ubi0: attaching mtd0 [ 312.676587] ubi0 error: ubi_attach_mtd_dev: bad VID header (8) or data offsets (72) 00:08:55 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) lstat(0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)=ANY=[], 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102000002) 00:08:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r1, r4, 0x0, 0x8000fffffffe) ptrace(0x4206, r0) tkill(r0, 0x9) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:08:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(&(0x7f0000000240), &(0x7f0000000140)='.', 0x0, 0x3002480, 0x0) 00:08:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') [ 313.037838] audit: type=1804 audit(1569888536.039:98): pid=12610 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir134261732/syzkaller.qGMibt/185/bus" dev="sda1" ino=17038 res=1 00:08:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r1, r4, 0x0, 0x8000fffffffe) ptrace(0x4206, r0) tkill(r0, 0x9) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:08:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r2, &(0x7f00000001c0), 0x0}, 0x20) 00:08:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000f00f88)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='s'], 0x1, 0x0) msgrcv(r0, &(0x7f0000000040)={0x0, ""/152}, 0xa0, 0x0, 0x0) 00:08:56 executing program 5: sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg$key(r0, &(0x7f0000000000)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0200000007002c00001a000017a667beda8e44a6"], 0x2a1}}, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getgid() 00:08:56 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) bind$inet(r1, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) write$binfmt_elf64(r1, 0x0, 0x0) accept4$inet(r1, 0x0, &(0x7f0000000040), 0x80000) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000080)={{0x2, 0x4e20, @broadcast}, {0x306, @random="cba52ffd3c87"}, 0x8, {0x2, 0x4e21, @rand_addr=0x100}, 'nlmon0\x00'}) syz_emit_ethernet(0x0, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 00:08:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x15, 0x10, 0x3}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f00000004c0)={r0, 0x0, 0x0}, 0x20) 00:08:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 00:08:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r1, r4, 0x0, 0x8000fffffffe) ptrace(0x4206, r0) tkill(r0, 0x9) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:08:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700a400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000002400070507cc1810b5b9b2e3a2c12b00", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff0000000008000100687462001c0002001800020003000400"/48], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3400000064000705000000000011000000000000", @ANYRES32=r4, @ANYBLOB="0000ffff0000ffff00000085e6000100677265640000000004000200"], 0x34}}, 0x0) 00:08:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) prctl$PR_SVE_GET_VL(0x33, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x200, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getuid() getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) 00:08:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x84003ff) fallocate(r2, 0x3, 0x0, 0x7203) fallocate(r1, 0x0, 0x0, 0x84003ff) 00:08:56 executing program 1: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @rand_addr="000000000000000000000000efff00"}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x40}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x3) 00:08:56 executing program 2: fchmodat(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) [ 313.797853] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 00:08:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xe4ffffff, 0x65}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 00:08:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x0, 0xffffffffffffffff}}}, 0x90) 00:08:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0x40000000], [0xc1]}) [ 313.932923] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 314.014367] ------------[ cut here ]------------ [ 314.019305] WARNING: CPU: 1 PID: 12695 at kernel/fork.c:677 __put_task_struct.cold+0x29/0x48 [ 314.027891] Kernel panic - not syncing: panic_on_warn set ... [ 314.027891] [ 314.035259] CPU: 1 PID: 12695 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 314.042174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.051514] Call Trace: [ 314.054100] dump_stack+0x172/0x1f0 [ 314.057720] panic+0x263/0x507 [ 314.060902] ? __warn_printk+0xf3/0xf3 [ 314.064780] ? __put_task_struct.cold+0x29/0x48 [ 314.069437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.074964] ? __warn.cold+0x5/0x4a [ 314.078578] ? __warn+0xe8/0x1d0 [ 314.081938] ? __put_task_struct.cold+0x29/0x48 [ 314.086596] __warn.cold+0x20/0x4a [ 314.090126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.095654] ? __put_task_struct.cold+0x29/0x48 [ 314.100313] report_bug+0x263/0x2b0 [ 314.103954] do_error_trap+0x204/0x360 [ 314.107840] ? math_error+0x340/0x340 [ 314.111632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.117164] ? wake_up_klogd+0x99/0xd0 [ 314.121045] ? error_entry+0x7c/0xe0 [ 314.124757] ? trace_hardirqs_off_caller+0x65/0x220 [ 314.129782] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.134707] do_invalid_op+0x1b/0x20 [ 314.138418] invalid_op+0x14/0x20 [ 314.141859] RIP: 0010:__put_task_struct.cold+0x29/0x48 [ 314.147124] Code: ff e8 20 7d 2c 00 48 c7 c7 20 45 49 87 e8 f8 e3 16 00 0f 0b e9 34 4b ff ff e8 08 7d 2c 00 48 c7 c7 20 45 49 87 e8 e0 e3 16 00 <0f> 0b e9 c5 4a ff ff e8 f0 7c 2c 00 48 c7 c7 20 45 49 87 e8 c8 e3 [ 314.166029] RSP: 0018:ffff88808e7ffcd8 EFLAGS: 00010286 [ 314.171387] RAX: 0000000000000024 RBX: 0000000000000000 RCX: 0000000000000000 [ 314.178649] RDX: 0000000000000000 RSI: ffffffff8155dbd6 RDI: ffffed1011cfff8d [ 314.185907] RBP: ffff88808e7ffd00 R08: 0000000000000024 R09: ffffed1015d25079 [ 314.193163] R10: ffffed1015d25078 R11: ffff8880ae9283c7 R12: ffff888050d4e3c0 [ 314.200418] R13: ffff888053e994f0 R14: 0000000000000000 R15: 0000000000000000 [ 314.207691] ? vprintk_func+0x86/0x189 [ 314.211571] ? __put_task_struct.cold+0x29/0x48 [ 314.216233] rdma_restrack_del+0x1da/0x240 [ 314.220457] rdma_destroy_id+0xac/0xab0 [ 314.224437] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 314.229528] ? complete+0x61/0x80 [ 314.232973] ucma_close+0x115/0x320 [ 314.236604] ? ucma_free_ctx+0xb90/0xb90 [ 314.240755] __fput+0x2dd/0x8b0 [ 314.244041] ____fput+0x16/0x20 [ 314.247312] task_work_run+0x145/0x1c0 [ 314.251207] exit_to_usermode_loop+0x273/0x2c0 [ 314.255781] do_syscall_64+0x53d/0x620 [ 314.259761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.264965] RIP: 0033:0x413711 [ 314.268169] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 314.287062] RSP: 002b:00007ffd75859420 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 314.294759] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413711 [ 314.302015] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 314.309270] RBP: 0000000000000000 R08: ffffffffffffffff R09: ffffffffffffffff [ 314.316527] R10: 00007ffd75859500 R11: 0000000000000293 R12: 000000000075bfc8 [ 314.323808] R13: 000000000004ca83 R14: 00000000007605d0 R15: 000000000075bfd4 [ 314.332803] Kernel Offset: disabled [ 314.336474] Rebooting in 86400 seconds..