[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.4' (ECDSA) to the list of known hosts. 2020/05/17 16:48:23 fuzzer started 2020/05/17 16:48:23 dialing manager at 10.128.0.26:40215 2020/05/17 16:48:23 syscalls: 3005 2020/05/17 16:48:23 code coverage: enabled 2020/05/17 16:48:23 comparison tracing: enabled 2020/05/17 16:48:23 extra coverage: enabled 2020/05/17 16:48:23 setuid sandbox: enabled 2020/05/17 16:48:23 namespace sandbox: enabled 2020/05/17 16:48:23 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/17 16:48:23 fault injection: enabled 2020/05/17 16:48:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/17 16:48:23 net packet injection: enabled 2020/05/17 16:48:23 net device setup: enabled 2020/05/17 16:48:23 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/17 16:48:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/17 16:48:23 USB emulation: /dev/raw-gadget does not exist 16:51:21 executing program 0: unshare(0x6c060000) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="03"], 0x1}}, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @remote}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x9, &(0x7f00000001c0)=0x40, 0x4) connect$inet(r4, &(0x7f0000000040)={0x2, 0x2, @local}, 0x10) syzkaller login: [ 243.879421][ T7099] IPVS: ftp: loaded support on port[0] = 21 16:51:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f00000aa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 244.067549][ T7099] chnl_net:caif_netlink_parms(): no params data found [ 244.152964][ T7202] IPVS: ftp: loaded support on port[0] = 21 [ 244.217491][ T7099] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.225177][ T7099] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.248142][ T7099] device bridge_slave_0 entered promiscuous mode 16:51:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) close(r1) [ 244.273243][ T7099] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.295681][ T7099] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.303888][ T7099] device bridge_slave_1 entered promiscuous mode [ 244.380025][ T7099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 244.413738][ T7099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 244.431807][ T7202] chnl_net:caif_netlink_parms(): no params data found [ 244.502025][ T7099] team0: Port device team_slave_0 added [ 244.521274][ T7099] team0: Port device team_slave_1 added [ 244.605766][ T7099] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 244.612731][ T7099] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.647905][ T7099] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 244.674474][ T7365] IPVS: ftp: loaded support on port[0] = 21 [ 244.697394][ T7099] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 244.704469][ T7099] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.733752][ T7099] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 16:51:22 executing program 3: recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x800000000002, @local}, 0x10) [ 244.807412][ T7202] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.814608][ T7202] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.825948][ T7202] device bridge_slave_0 entered promiscuous mode [ 244.841849][ T7202] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.865553][ T7202] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.885696][ T7202] device bridge_slave_1 entered promiscuous mode [ 244.959314][ T7099] device hsr_slave_0 entered promiscuous mode [ 245.006694][ T7099] device hsr_slave_1 entered promiscuous mode 16:51:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x801, 0x0, 0xffffff7f, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x50}}, 0x0) [ 245.192044][ T7202] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 245.224444][ T7202] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 245.237922][ T7405] IPVS: ftp: loaded support on port[0] = 21 [ 245.342258][ T7202] team0: Port device team_slave_0 added [ 245.405559][ T7202] team0: Port device team_slave_1 added [ 245.410045][ T7447] IPVS: ftp: loaded support on port[0] = 21 [ 245.551238][ T7202] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 245.565420][ T7202] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.593405][ T7202] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 245.620746][ T7365] chnl_net:caif_netlink_parms(): no params data found [ 245.642967][ T7202] batman_adv: batadv0: Adding interface: batadv_slave_1 16:51:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="fa"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @ipv4={[], [], @loopback}}]}}]}, 0x48}}, 0x0) [ 245.650504][ T7202] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.678056][ T7202] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 245.889019][ T7202] device hsr_slave_0 entered promiscuous mode [ 245.935796][ T7202] device hsr_slave_1 entered promiscuous mode [ 245.985635][ T7202] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 245.993598][ T7202] Cannot create hsr debugfs directory [ 246.049953][ T7661] IPVS: ftp: loaded support on port[0] = 21 [ 246.095082][ T7405] chnl_net:caif_netlink_parms(): no params data found [ 246.170091][ T7099] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 246.259506][ T7099] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 246.341361][ T7365] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.349228][ T7365] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.358083][ T7365] device bridge_slave_0 entered promiscuous mode [ 246.374642][ T7447] chnl_net:caif_netlink_parms(): no params data found [ 246.384982][ T7099] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 246.431338][ T7365] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.438965][ T7365] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.447875][ T7365] device bridge_slave_1 entered promiscuous mode [ 246.476343][ T7099] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 246.589730][ T7405] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.597814][ T7405] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.606796][ T7405] device bridge_slave_0 entered promiscuous mode [ 246.634196][ T7365] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.649681][ T7365] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.664942][ T7405] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.672702][ T7405] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.682640][ T7405] device bridge_slave_1 entered promiscuous mode [ 246.724878][ T7365] team0: Port device team_slave_0 added [ 246.760377][ T7365] team0: Port device team_slave_1 added [ 246.790380][ T7447] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.802253][ T7447] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.812379][ T7447] device bridge_slave_0 entered promiscuous mode [ 246.831115][ T7447] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.839257][ T7447] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.850421][ T7447] device bridge_slave_1 entered promiscuous mode [ 246.877472][ T7405] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.900680][ T7405] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.913688][ T7447] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.926471][ T7447] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.937155][ T7365] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 246.944116][ T7365] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.971721][ T7365] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 247.020905][ T7365] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 247.028661][ T7365] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.056454][ T7365] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 247.121577][ T7447] team0: Port device team_slave_0 added [ 247.168895][ T7365] device hsr_slave_0 entered promiscuous mode [ 247.235775][ T7365] device hsr_slave_1 entered promiscuous mode [ 247.285475][ T7365] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 247.293868][ T7365] Cannot create hsr debugfs directory [ 247.303379][ T7405] team0: Port device team_slave_0 added [ 247.332646][ T7447] team0: Port device team_slave_1 added [ 247.379453][ T7405] team0: Port device team_slave_1 added [ 247.393994][ T7661] chnl_net:caif_netlink_parms(): no params data found [ 247.411696][ T7447] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 247.418849][ T7447] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.448064][ T7447] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 247.459665][ T7202] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 247.542636][ T7447] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 247.552285][ T7447] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.580157][ T7447] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 247.592265][ T7202] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 247.640546][ T7405] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 247.647719][ T7405] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.676117][ T7405] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 247.711800][ T7202] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 247.769099][ T7202] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 247.831997][ T7405] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 247.839139][ T7405] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.865285][ T7405] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 247.979075][ T7447] device hsr_slave_0 entered promiscuous mode [ 248.035732][ T7447] device hsr_slave_1 entered promiscuous mode [ 248.089041][ T7447] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 248.096802][ T7447] Cannot create hsr debugfs directory [ 248.169310][ T7405] device hsr_slave_0 entered promiscuous mode [ 248.225707][ T7405] device hsr_slave_1 entered promiscuous mode [ 248.265421][ T7405] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 248.273261][ T7405] Cannot create hsr debugfs directory [ 248.280023][ T7661] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.287653][ T7661] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.296658][ T7661] device bridge_slave_0 entered promiscuous mode [ 248.310951][ T7661] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.318387][ T7661] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.329582][ T7661] device bridge_slave_1 entered promiscuous mode [ 248.480598][ T7661] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 248.497468][ T7661] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.512095][ T7099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.556370][ T7365] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 248.636096][ T7099] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.645098][ T7661] team0: Port device team_slave_0 added [ 248.656637][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.666976][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.679517][ T7365] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 248.741421][ T7365] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 248.790999][ T7365] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 248.854974][ T7661] team0: Port device team_slave_1 added [ 248.886807][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.896520][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.905099][ T3198] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.912470][ T3198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.952401][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.964658][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.976458][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.985020][ T3201] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.992167][ T3201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.000919][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.010887][ T7661] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 249.022133][ T7661] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.049379][ T7661] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 249.094919][ T7661] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 249.113274][ T7661] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.146348][ T7661] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 249.189566][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.215268][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.224096][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.269736][ T7661] device hsr_slave_0 entered promiscuous mode [ 249.333637][ T7661] device hsr_slave_1 entered promiscuous mode [ 249.385423][ T7661] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 249.393167][ T7661] Cannot create hsr debugfs directory [ 249.421099][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.430070][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.439837][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.476577][ T7405] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 249.513503][ T7405] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 249.550839][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.560027][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.596104][ T7405] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 249.639382][ T7099] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 249.653165][ T7099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 249.680447][ T7202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.688974][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 249.700304][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 249.709995][ T7405] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 249.818820][ T7447] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 249.891357][ T7447] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 249.959292][ T7447] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 250.028596][ T7447] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 250.145388][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.152876][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.162096][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.170423][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.184264][ T7202] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.210367][ T7099] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 250.241238][ T7365] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.277085][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.286486][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.294928][ T3003] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.302099][ T3003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.312885][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.322578][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.331709][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.341754][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.348907][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.374850][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.384198][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.421233][ T7365] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.443865][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.485215][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.495044][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.505048][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.548531][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.557406][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.570204][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.580215][ T3201] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.588275][ T3201] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.596549][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.605964][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.643778][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.654663][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.665593][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.674058][ T3198] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.683515][ T3198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.698724][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 250.709310][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.720289][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 250.731401][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.755373][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.764198][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.780893][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.792028][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.805525][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.814420][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.832163][ T7405] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.843688][ T7661] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 250.888796][ T7661] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 250.964281][ T7365] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 250.975524][ T7365] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 250.994258][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.002795][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.011994][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.023588][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.032885][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.052421][ T7202] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 251.067830][ T7202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.078228][ T7661] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 251.148563][ T7661] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 251.215423][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.224157][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.233317][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.253405][ T7099] device veth0_vlan entered promiscuous mode [ 251.266001][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 251.274420][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.288837][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.298401][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.332204][ T7099] device veth1_vlan entered promiscuous mode [ 251.341154][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 251.351317][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.359856][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.373898][ T7405] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.436522][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 251.444849][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.453408][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.462062][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.470426][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.489275][ T7365] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 251.521054][ T7202] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 251.529043][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.542073][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.551109][ T2993] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.558270][ T2993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.571822][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.590447][ T7447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.631232][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.640909][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.650975][ T2991] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.658237][ T2991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.668591][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 251.678085][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 251.687433][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.700843][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.711361][ T7099] device veth0_macvtap entered promiscuous mode [ 251.736395][ T7447] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.764135][ T7099] device veth1_macvtap entered promiscuous mode [ 251.792669][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 251.801228][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 251.814355][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.822728][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.836171][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.844864][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.853958][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.862793][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.872205][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.881490][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.928443][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.936879][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.946637][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.955544][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.963932][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.973518][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.982820][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.991694][ T2993] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.999058][ T2993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.007090][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.016205][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.024903][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.033921][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.044178][ T2993] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.051547][ T2993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.059824][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.073947][ T7405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.106406][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.114838][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.142736][ T7365] device veth0_vlan entered promiscuous mode [ 252.180463][ T7202] device veth0_vlan entered promiscuous mode [ 252.190097][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.202305][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.211748][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.221833][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.230910][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.239791][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.251237][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 252.260271][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.273774][ T7365] device veth1_vlan entered promiscuous mode [ 252.286279][ T7099] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 252.300032][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.308937][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.317397][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 252.326461][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.334311][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.342964][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.351691][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.361032][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.370699][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 252.379799][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 252.400240][ T7405] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.424194][ T7661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.436335][ T7099] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 252.444727][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.455128][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.463451][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 252.473230][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.490380][ T7447] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 252.510052][ T7447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.532941][ T7202] device veth1_vlan entered promiscuous mode [ 252.543666][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.555155][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.579992][ T7661] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.616716][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.624582][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.665385][ T7365] device veth0_macvtap entered promiscuous mode [ 252.674629][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.684224][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.700000][ T2991] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.707706][ T2991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.717482][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.727295][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.735995][ T2991] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.743457][ T2991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.751490][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 252.760455][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.769747][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 252.778618][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.815561][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.823612][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 252.834577][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.847226][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 252.854686][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.928528][ T7365] device veth1_macvtap entered promiscuous mode [ 252.941274][ T7447] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.014595][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.036553][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 253.047065][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.057041][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.123175][ T7202] device veth0_macvtap entered promiscuous mode [ 253.155040][ T7405] device veth0_vlan entered promiscuous mode [ 253.162076][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.191116][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.208630][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.214034][ T8356] IPVS: ftp: loaded support on port[0] = 21 [ 253.227394][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.251809][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.263917][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.273966][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.283987][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.300513][ T7365] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.319185][ T7365] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.343387][ T7365] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 253.369765][ T7202] device veth1_macvtap entered promiscuous mode [ 253.395985][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 253.411380][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.425686][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.437389][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.447072][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.462726][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 253.474700][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.483928][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.495559][ T8362] netlink: 40067 bytes leftover after parsing attributes in process `syz-executor.0'. [ 253.509122][ T7365] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 253.524069][ T7365] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.540550][ T7365] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 253.645385][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.654116][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 253.669023][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.678098][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.710667][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.732896][ T7405] device veth1_vlan entered promiscuous mode [ 253.836369][ T7202] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.854260][ T7202] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.864536][ T7202] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.875804][ T7202] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.890751][ T7202] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 253.956982][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.966482][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.977084][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.986038][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.997356][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.005736][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.027098][ T7202] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.040836][ T7202] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:51:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x40040, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x40}, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r2, 0x0, r3, 0x0, 0x1420000a77, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r2, 0x8004500f, &(0x7f0000000000)) [ 254.055601][ T7202] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.067149][ T7202] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.087323][ T56] tipc: TX() has been purged, node left! [ 254.099236][ T7202] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 254.214037][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 254.222293][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.234021][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:51:31 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) dup2(r0, r0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x8002) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') dup(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000200)={0x14, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0xe, 0x0, &(0x7f0000000140)="d8dcac09e03c3515ad822706214d"}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x2, 0x1, 0x1000, 0x1, 0x80}) [ 254.282791][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.314697][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.388148][ T7405] device veth0_macvtap entered promiscuous mode [ 254.407190][ T7661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.429368][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.456776][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.489024][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 16:51:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd65660f382201c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d6830f01caed", 0x14}], 0x1, 0x0, 0x0, 0x25a) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/adsp1\x00', 0x0, 0x0) write$apparmor_exec(r3, &(0x7f0000000140)={'exec ', '/dev/kvm\x00'}, 0xe) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xec100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x80000000000000}, 0xb20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xd8d0668c81aa2fa3) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0100000000000000240012000c000100627269646765000e140002000800070000000000080027"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0x7}]}}}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, 0x0, 0x800, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0xef82, 0x2}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x30}, 0x1, 0x0, 0x0, 0x10000000}, 0x805) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 254.523871][ T7405] device veth1_macvtap entered promiscuous mode [ 254.555986][ T7447] device veth0_vlan entered promiscuous mode [ 254.590718][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.592569][ T8404] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 254.600531][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.626091][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.766158][ T7447] device veth1_vlan entered promiscuous mode [ 254.781000][ T7405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.819721][ T7405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.866754][ T7405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.923181][ T7405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:51:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400d1, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf93a1a7511bf746bec66ba", 0xfe2d, 0x20c49a, 0x0, 0x27) [ 254.978506][ T7405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.051396][ T7405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.121689][ T7405] batman_adv: batadv0: Interface activated: batadv_slave_0 16:51:32 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8100, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0x7, 0x6, 0x101, 0x4}) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000380)) fcntl$dupfd(r4, 0x0, r4) shutdown(r1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={[], [], @empty}}, 0x1c) keyctl$dh_compute(0x17, &(0x7f0000000200), &(0x7f0000000240)=""/61, 0x3d, &(0x7f0000000340)={&(0x7f0000000280)={'nhpoly1305-avx2\x00'}, &(0x7f00000002c0)="57e86da88e3febc0f4e4d38abea55354b7671be766c3b00d2cc7a63da2e9eaee616953b42d441db96fcda8c917f8af4cf65810831c4262f50defd8bf80c8e1cbfbe816c6dcc7b25a7b62ebc04dd640705793e5", 0x53}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r6, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x200403, 0x0) listen(0xffffffffffffffff, 0xf) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @remote}]}, &(0x7f0000000180)=0x10) [ 255.198551][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.223604][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 16:51:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x101200, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x2, 0x1, 0xa4}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0xdba3dd835d632dde}, 0x48) [ 255.294440][ T7405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.333470][ T7405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.372423][ T7405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.412519][ T7405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.443849][ T7405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.477842][ T7405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.525844][ T7405] batman_adv: batadv0: Interface activated: batadv_slave_1 16:51:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ppoll(0x0, 0x0, 0x0, 0x0, 0xb2db1ba00b003f00) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x1) r2 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x1) getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f0000000140)=""/102, &(0x7f00000001c0)=0x66) [ 255.609530][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.627767][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.632873][ C1] hrtimer: interrupt took 60300 ns [ 255.738240][ T7447] device veth0_macvtap entered promiscuous mode [ 255.818436][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 255.838216][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.904219][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 255.955784][ T7447] device veth1_macvtap entered promiscuous mode [ 256.060793][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 256.081488][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.203210][ T7447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.262476][ T7447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.326707][ T7447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.383457][ T7447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.413030][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 256.432686][ T7447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 16:51:33 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)={0x34, r4, 0xc694d42685586125, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}, @GTPA_LINK={0x8}]}, 0x34}}, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) accept(r5, 0x0, 0x0) ioctl$sock_SIOCDELRT(r5, 0x890c, &(0x7f0000000200)={0x0, @ax25={0x3, @default, 0x5}, @tipc=@name={0x1e, 0x2, 0x3, {{0x41, 0x4}}}, @can={0x1d, 0x0}, 0x1ff, 0x0, 0x0, 0x0, 0xfc8c, &(0x7f0000000180)='veth1\x00', 0xff, 0x0, 0x7}) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x60, r4, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_LINK={0x8, 0x1, r6}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_NET_NS_FD={0x8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_VERSION={0x8}, @GTPA_I_TEI={0x8}, @GTPA_VERSION={0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x408c4}, 0x14000800) accept$inet(r2, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000100)=0x9, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(0x0, 0x0, 0x3, r0, 0x0) 16:51:33 executing program 3: pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000002000128009000100766c616e0000000010000280040004800600010000000000080005003a1ab1381532c2c23fa46c86740279e077950435701157fcc6533a722ee7fe1fe9d25a005dae65799ddb5cec22c87377bad8173f73a8ea593252a48ff9b390ca9cd3ebd127d33481b9093f39a9b1b13863cad23a0ae86e4fd5d483175054e5e9852116153ad8f4aa914e2e6abab07fb9a96013c9505f8fd56537d60c61496a4f3e5a6258ab6f000000000000000000", @ANYRES32=r1, @ANYBLOB="055b6abd978102b55ec411fc20c6f4d397670e85ecbb4ded93e5db4442947a3c863de806000000f7cf7fc2ac83a955fc921cecd3"], 0x48}}, 0x0) [ 256.484879][ T7447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.554861][ T7447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.598298][ T7447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.670798][ T8454] hfs: can't find a HFS filesystem on dev loop1 [ 256.715076][ T7447] batman_adv: batadv0: Interface activated: batadv_slave_0 16:51:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000001440), 0xfffffc41) r4 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xa001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r7, 0x4080aebf, &(0x7f0000000000)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000000)=ANY=[], 0xfffffd88) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r7, &(0x7f0000000000)={r8, r4, 0x6}) [ 256.789372][ T8458] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. [ 256.818457][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 256.840308][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 256.889875][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 256.931579][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.974128][ T7447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.039684][ T7447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.141185][ T7447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.191828][ T7447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.218499][ T7447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.236776][ T7447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.256461][ T7447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.273556][ T7447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.288282][ T7447] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 257.307117][ T7661] device veth0_vlan entered promiscuous mode [ 257.314347][ T8464] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. [ 257.330742][ T3197] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.348392][ T3197] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.372836][ T3197] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.406392][ T3197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 257.477355][ T7661] device veth1_vlan entered promiscuous mode [ 257.707019][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.716677][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.747160][ T7661] device veth0_macvtap entered promiscuous mode [ 257.760845][ T7661] device veth1_macvtap entered promiscuous mode 16:51:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r1, 0x0, 0x0) accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) r2 = socket$inet6(0xa, 0x3, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2b}, {}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x1, 0x1}, {{@in=@local, 0x0, 0x2b}, 0x0, @in=@private=0xa010101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, 0xe8) connect$inet6(r2, &(0x7f0000000480)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) getsockname$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) [ 257.838874][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 257.869081][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.917056][ T7661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.935121][ T7661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.034867][ T7661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 258.054787][ T7661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.074806][ T7661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 258.094099][ T7661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.117013][ T7661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 258.138453][ T7661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.148710][ T7661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 258.159529][ T7661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.171850][ T7661] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 258.198707][ T7661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 258.221651][ T7661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.236605][ T7661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 258.249520][ T7661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.260204][ T7661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 258.270747][ T7661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.280851][ T7661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 258.292713][ T7661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.302607][ T7661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 258.313114][ T7661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.324488][ T7661] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 258.339505][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 258.348542][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 258.357639][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 258.367206][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:51:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='uni_xlate=1$ ']) 16:51:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x206, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) syz_open_dev$media(0x0, 0x3ff, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r3, 0x10c, 0x4, &(0x7f0000000040), 0x4) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8983, &(0x7f0000000040)={0x8, 'dummy0\x00', {'syzkaller1\x00'}, 0x401}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f0000000340)="a0ad18566dc009c92bde8566da9624c0dd9eb5d6c5b2635ffff034752fd6978194bc8e9b6548", 0x401}, 0x38) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000200)={0x3, 0x4000, "c4b464fac4080b5e12f1aa3937d7ef6362092b88ce00fd62", {0x9, 0x6}, 0xf658}) 16:51:35 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x20010000, &(0x7f0000000300)=[{&(0x7f0000000080)="450000002b000535a4abd32b8018007a022482c104003e372d0003800125d124000000b3e9d3dfd08304000000000000", 0x30}, {&(0x7f0000000040)="6a2a261bb49c3cf3a3d05f89b8f2818aa9859d58f4", 0x15}], 0x2}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r3, 0x2, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x20000080) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) splice(r4, 0x0, r5, 0x0, 0x1420000a77, 0x0) write$dsp(r4, &(0x7f0000000100)="c5cff7dbe68660dae804eb6c634d63ea030bafa32965ed442854899b120953ad5fbfe41dca1eb7648260ef1110f81b59a760f6f7a20880dd06bc03d8ded047083bcd8b5c84039876999bee1932a16cc9c1c8611ee8a541b9f27d518bef46e5e9f37910522d58b2ea88", 0x69) 16:51:35 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="040100001a0005020000000000000000fc020000000000000000000000000000200100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000003c000000fe88000000000000000000000000000100000000000002000000000000000000000000000000000000000000000000000000010000000000000000000000000067a538fc9979b8ee39647019439d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000014000e00ac1e0001000000000000000000000000354925f6c7b5fe2f52a088fd5d695da18157af7f550b4b2ca6378e376bc525786a0996"], 0x104}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 16:51:35 executing program 0: ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c9130001", 0xfed3}], 0x1}, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000005c0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="010000000000000025ebbf1c218085955e69646765000e1400020008d70700ac68818dee24010000008c6ec100000000080027355beea68d735fa6291b126c628972f799b89cda319a"], 0x44}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000640)=ANY=[@ANYBLOB="1c00481100000000000013a1fbdbdf258020107f0000010b00060000cfae58d421c6163317bf86eb8cc124c2eff5dc0eaf2887cb6a5b1c82340f11fe4ce8d47802cab1d8b375c62eef149bb1cd924afe78e1c64ff6a583ab18680572b33d593316b6b0379f361ccf5a0fc0c855c18710fca156cac5acc4548c8ad2deda92030a39faf4cdc84c38277621"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002809e5e6fed75c277aa178357a6007cbc3bd7000fe4bfd256b000000", @ANYRES32=r4, @ANYBLOB="080001000100000008000100030000000c0099005e0e0000030000000c00990005000000040000000cfa33a5c5566c44286e31f6dc45e5122efd8c412d43140ec306250cadd6084094b9d9ff54908c6027c02c5912d6d580d39abb7486e56b9616f76a9da111c293b562390ccaec3cbd80887092b427677ebc80324fbac9b16cfec9543feebc013487dda1b2a96a51845500cc05e9bbeee6ef32ccced5ef4edfa6b1bc9862e85d4847e6bd76b6366cb66a373a6e55fe4110feeeb9f9bd62c2ccfdbb13c166498242362747973203852cc4a8050c08a4147bf4c52c92"], 0x50}, 0x1, 0x0, 0x0, 0x24044011}, 0x800) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102", 0x1b}], 0x1}, 0x1) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x200003f8, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 16:51:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0100000000000000240012000c000100627269646765000e140002000800070000000000080027"], 0x44}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0x7}]}}}]}, 0x3c}}, 0x0) bind$packet(r1, &(0x7f0000000000)={0x11, 0x6, r5, 0x1, 0x4, 0x6, @random="eb89dc26be02"}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000340)=@sack_info={0x0, 0x3}, 0xc) [ 258.712370][ T8508] netlink: 'syz-executor.4': attribute type 7 has an invalid length. [ 258.725005][ T8510] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 258.780944][ T8515] FAT-fs (loop1): Unrecognized mount option "uni_xlate=1$ " or missing value [ 258.794179][ T8508] netlink: 'syz-executor.4': attribute type 39 has an invalid length. [ 258.803177][ T8513] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 258.818587][ T8511] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 16:51:36 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x12) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000280)={r5}, &(0x7f00000003c0)=0x8) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r6, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) setsockopt$llc_int(r7, 0x10c, 0x1, &(0x7f0000000080)=0x101, 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[@ANYRES32=r5, @ANYBLOB="a5000000cac785271996bec2bad64c62fecec101be31e221b41242e7c6213cd3ded8960909f9879b5b91680b51bf6215c795400bc383ecf747c33b06f83ae448d6c8b6b809d7a1f19511f66a784f865cbe4b4d75b0037c84c9108cfa2378e47d5fbde3407b46f59521c5801c718e23d31a1e751cb76f5111fc84536331d58d5254b08d0ba8c8c32a9f613cd26686d9c0e2502ca7a4bdc9fdca07cd3f6e443629f0d84c91d7dbf59419"], &(0x7f0000000040)=0xad) [ 258.989789][ T8511] team0: Device ipvlan1 failed to register rx_handler [ 259.538339][ T8522] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 259.569545][ T8511] syz-executor.5 (8511) used greatest stack depth: 22264 bytes left [ 259.584450][ T8513] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 16:51:36 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xfffffffffffffd22, 0x0, 0x1182062, 0x0) 16:51:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000092, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0xe00}}]}}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001a00)=ANY=[]) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280), 0x4000) [ 259.616823][ T8508] netlink: 'syz-executor.4': attribute type 7 has an invalid length. [ 259.640616][ T8508] netlink: 'syz-executor.4': attribute type 39 has an invalid length. 16:51:37 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r3 = dup(r2) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ftruncate(r1, 0x800fe) sendfile(r3, r4, 0x0, 0x800000000008) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="f72bc2ea30715b8b13dc0141ed2ffc00"], 0x17) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r6, 0x0, 0x0) ioctl$SIOCAX25CTLCON(r6, 0x89e8, &(0x7f0000000140)={@null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1, 0x0, 0x4, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) [ 259.667754][ T8525] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 259.709492][ T8525] team0: Device ipvlan1 failed to register rx_handler [ 259.783424][ T26] audit: type=1804 audit(1589734297.077:2): pid=8546 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir993380686/syzkaller.LaHUE1/6/bus" dev="sda1" ino=15791 res=1 [ 259.846322][ T8543] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 259.871536][ T8543] XFS (loop0): SB validate failed with error -5. [ 259.929010][ T8532] syz-executor.3 (8532) used greatest stack depth: 21480 bytes left 16:51:37 executing program 3: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ocfs2_control\x00', 0x121201, 0x0) close(r2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x4b41, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) splice(r5, 0x0, r6, 0x0, 0x1420000a77, 0x0) write$UHID_SET_REPORT_REPLY(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e000000070000007f7f6f00cf2a470ffc6b2dbb623102532c261b08283795518843a2696c7656240e9683550e061f8b307f8d1ae86bb8edf1ff9aaa35fe6cb6947e6b76c73980080000003b8cf026d3ee8941e322b14bc1c13b4caa4ccb2f"], 0x7b) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x10000000000, {0xa, 0x4e23, 0x80200000, @mcast2, 0x7ffb}, r4}}, 0x38) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c0000001800230000003c8e4c00df2ce8f609b763ac2588b109827600000040000042742c51cfc34c7164488eadc10c46d5af98a38d8eded1259d9edfb677dfeff2d50014ec52db6f023b188cb398c36c15713dca92328d821dc6db1cdff4c56bf293883cd777a57662ebb639be4f473cc4de76b212920e02f2aa49661fea1dc802b61ea8ce2857b9300be42aceeeecfd6de87f694677f491f524fc2db1ede6dfbb81636dbfd0435ca37ab8207b13ec21e0d14657af4adf42a290986709e561157027c9312ee1154d0000000000000080125380bac4fbba1323bf29461cc37c886dcaa358", @ANYBLOB="b59e933a4392003f3e0b7743519d42a1949cf32123f052c715ee1309fe6e0d66476812df0695f1aee78e52cb62c5a64a64709e", @ANYRES16=r3], 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x1000c801) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x4) r9 = dup3(r7, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 260.197452][ T2661] blk_update_request: I/O error, dev loop0, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 [ 260.336679][ T2661] blk_update_request: I/O error, dev loop0, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 16:51:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800, 0x0, 0x1, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$l2tp(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x100000000000085) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000100)={"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"}) r4 = dup3(r1, r2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000640)={0xb, 0x77, 0x2, 0x100}, 0xb) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8cf451180000004d94ddfd5c704abcf6d69547eb05b6799d8a492ad7d2dba41ea7f54579a8197c6796947b259acd054e9e305320050ec9cb64e84ff1517b02092fe5461157a302cc1a9ccf2ef3931a3a4fddd6e56b3bf4890fdb6cbd59b40322e500abe3542084070ff7f4bf71dabfd31d87a8d19f5c9a06e5d8f0612d4f8db817b33bd9fdf92cdc6cc1", @ANYRES16=r5, @ANYBLOB="6ffe00000000000000000400000004000180"], 0x18}}, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000005c0)={&(0x7f0000000780)={0x84, r5, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x60, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x400}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip6tnl0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x40500c0}, 0x20000040) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000500)=ANY=[]) dup2(r4, r3) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1803021}, 0xc, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYRESDEC, @ANYRES16=r0, @ANYBLOB="00082bbd7000fedbdf25070000000800090001000000050005000000000008001700", @ANYRES32=r4, @ANYBLOB="53496905ceee4b87bcbc886827d8cfcdbbfc7f89b69333"], 0x2c}, 0x1, 0x0, 0x0, 0x200080c5}, 0x2000a001) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r6, 0x0, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:51:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xffffffffffffffda, 0x7, {0x2}}, 0x18) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) connect$netlink(r1, &(0x7f0000000040)=@unspec, 0xc) ioctl$TIOCSTI(r1, 0x5412, 0x7) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0xe8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x611ed, 0x4b000}, [@IFLA_LINKINFO={0x8c, 0x12, 0x0, 0x1, @ip6gre={{0xb, 0x1, 'ip6gre\x00'}, {0x7c, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast1}, @IFLA_GRE_ENCAP_LIMIT={0x5, 0xb, 0x3}, @IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e21}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3ff}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x2}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_LOCAL={0x14, 0x6, @local}, @IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x1000}, @IFLA_GRE_REMOTE={0x14, 0x7, @loopback}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_PHYS_PORT_ID={0x24, 0x22, "f9ffff239ce825528be8c78ab75c2d2017678a639d32a72cf4e2577400000000"}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0xb923}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x5c05}]}, 0xe8}, 0x1, 0x0, 0x0, 0x404c010}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 16:51:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) getsockname$l2tp(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB="2c6e6f6488eae272782c00"]) [ 260.501475][ T8568] bond0: (slave ip6gre1): ether type (823) is different from other slaves (1), can not enslave it [ 260.529033][ T8542] fuse: blksize only supported for fuseblk [ 260.572702][ T26] audit: type=1804 audit(1589734297.867:3): pid=8554 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir993380686/syzkaller.LaHUE1/6/bus" dev="sda1" ino=15791 res=1 16:51:38 executing program 1: setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000240)=0x1, 0x4) socket(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x2ce541, 0x1f0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) socket$inet6(0xa, 0x2, 0x9b) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000140)='\x00', r4, &(0x7f00000001c0)='./bus\x00', 0x7) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000100)={0x2, 0x6}, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) mlock2(&(0x7f0000506000/0x3000)=nil, 0x3000, 0x0) [ 260.657893][ T26] audit: type=1800 audit(1589734297.957:4): pid=8581 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=15785 res=0 16:51:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2fe00000000007, 0x0, 0x4, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x101) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)=0x403, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 260.889973][ T26] audit: type=1800 audit(1589734298.187:5): pid=8575 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=15785 res=0 [ 260.934217][ T8574] bond0: (slave ip6gre1): ether type (823) is different from other slaves (1), can not enslave it 16:51:38 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f0000000000)) 16:51:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = dup2(r1, r2) ioctl$USBDEVFS_REAPURB(r3, 0x4008550c, &(0x7f0000000000)) getpid() getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000140)=0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) sendto$inet6(r6, &(0x7f0000f6f000), 0x0, 0x2400c484, &(0x7f0000b63fe4)={0xa, 0x4e22, 0x8000000, @private2}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) 16:51:38 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYRESHEX], &(0x7f00000003c0)=""/225, 0x48, 0xe1, 0x8}, 0x20) [ 261.256203][ T8613] kvm: emulating exchange as write 16:51:38 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x40010, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x2) io_setup(0x5, &(0x7f0000001140)=0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0xa6) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x25, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xd01000}]) dup(0xffffffffffffffff) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0xfffffffffffffc9b) r2 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="05000000000000000000010000000500050060000000050006000000000008000300870d0000"], 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="020029bd70000000de7900000008d900"/32], 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x6048000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x1) 16:51:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x400}, 0x8) socket$unix(0x1, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x8802, 0x0) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="20000000051421d003000000000000000800cbbb17cd494b32763d9cc81f85f67b6d2ee9855c8ab467222ff6feff5e120000000000000004b5cb010304799184b585d215c988da420b7f3051c3c15ce99ee0d63efc8ce90bee0a59fb85f1cc391fbb2d94da1cadb0465a35cb7db1f164d47e1e0cb0abded8f5d34e3aaa9a00bd4515e1e3d5e9cbaaf96e48088ae81caa55596dd09ced9901aa70b28341cf87700b3425e510a3a4e2f1e96d04ce2351d896bb0ce1aa38bd5fc854082515de6143681f22b8adb63ec83e26e6e23f3aaaf6f28c6f105cb99be7674d05a3a8dac065e554ef51a5d0c427d820fdfbe5fe2747bb193355feed56d295ada5ad6ab708831ddc5819f8d280a479d25e7dc3959bc0f921596762f83faa88d32281fbb8c6cb6414767fac3f90df0fd88cf25a532c7f14051b7f0225a888e7a8f877997ce0d6953a19a9522f402ff8345d4a1b2e30068f7ead3a637150542d899c65187833b611d3"], 0x20}}, 0x0) preadv(r2, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/38, 0x26}], 0x1, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f0000000440)={0x28, 0x2, 0x0, {0x2}}, 0x28) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$FS_IOC_SETFSLABEL(r5, 0x41009432, &(0x7f0000000300)="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") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 16:51:38 executing program 3: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/88, 0x58}], 0x1, 0xffffffffffff8001) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 16:51:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[], 0x201) fcntl$setstatus(r1, 0x4, 0x6100) write$P9_RREMOVE(r1, &(0x7f0000000180)={0x7, 0x7b, 0xfffd}, 0x7) pwritev(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)='g', 0x1}], 0x1, 0x400) [ 261.416563][ T8633] BPF:btf_header not found [ 261.431603][ T8634] BPF:btf_header not found [ 261.530273][ T26] audit: type=1804 audit(1589734298.827:6): pid=8641 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir611003079/syzkaller.ZrOOli/7/bus" dev="sda1" ino=15770 res=1 16:51:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x8, 0x43fb, 0x0, 0x1}, 0x40) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) getpeername(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x80) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000100)={'sit0\x00', {0x2, 0x4e24, @remote}}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xfffffd88) write$P9_RREAD(r4, &(0x7f0000001000)={0x100b, 0x75, 0x1, {0x1000, "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"}}, 0x100b) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x1}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x4, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x8}, 0x40) recvmsg$kcm(r1, &(0x7f0000000c40)={0x0, 0x0, 0x0}, 0x2020) [ 261.592404][ T8645] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 261.702723][ T8657] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 16:51:39 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffeae, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x101203, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)='ip6tnl0\x00') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$FBIOBLANK(r1, 0x4611, 0x3) 16:51:39 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x5}, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$netlink(0x10, 0x3, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000041000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f0000000000)="3e0f01ca650fae82009000000f01c90f439a02000000c744240000000000c7442402b46d0000c7442406000000000f011c2466b8e8000f00d00f2202b9800000c00f3235008000000f30660f38f8a90a0000003e0f07", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r6, 0x4080aebf, &(0x7f0000000000)) fcntl$setlease(r6, 0x400, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 16:51:39 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000040)={0x3d1, 0x7, 0x4, 0x20000000, 0x5, {}, {0x2, 0x2, 0x3f, 0x9, 0x8, 0x0, "9f5d3fb1"}, 0x1f, 0x2, @userptr=0x80, 0x3, 0x0, r2}) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f00000000c0)={0xfffffffd, 0x10003, "06fe66bb5d6416f88babf51f3c1bf1101d8656baade87b01", {0xd2b7, 0x6}, 0xfffffffb}) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r4, r0) 16:51:39 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000080)="be608ad8c117a284705e9df17802884a6303ce7c170caa3831e45c08eb32d732dfe09b8083c9b4fd6fcd0f726e152eb5340cf83538164ce9d86a82984395bf597dc5a897e83e6bf0b96833986d5797eea44f718507ae69785c85b777e195f52591ac42618dd69fafbcfecb520a6c5d82be39483224baf259c718389c97eaa6b029d90107349ab38f1eaf938ec919e306a635822c58eea34021a19eacef9049296050584d9812d71592a0eee3dea37ae0382943a44cad1a4d660ef5", &(0x7f0000000000)="2ab1723901b1c42e6254ee537c8a99a6d0e163802b6dc12c5f4bd2e26bd1ec"}}, &(0x7f0000000180)) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x2c00, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x38, r3, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x1c, 0x0, @l2={'eth', 0x3a, 'netdevsim0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r3, 0x8, 0x70bd25, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008004}, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYRES16=r0, @ANYRES32, @ANYRESHEX, @ANYRESHEX=0x0, @ANYRES64, @ANYRESHEX=0x0], 0xfffffd88) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$BLKROTATIONAL(r6, 0x127e, &(0x7f0000000140)) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r8 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x81) ioctl$KVM_RUN(r8, 0xae80, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1002000000013) 16:51:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x9, 0x200) connect$pppl2tp(r1, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x4, {0xa, 0x4e24, 0xfffffffc, @private1, 0x9}}}, 0x32) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180)={0x80, 0xb57d, 0x4, 0x7fff}, 0x8) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="140000002b000535d25a80648c63940d0424fc60", 0x14}], 0x1}, 0x0) [ 262.430441][ T8698] tipc: Started in network mode [ 262.469096][ T8698] tipc: Own node identity 76a5902421ab, cluster identity 4711 [ 262.504323][ T26] audit: type=1804 audit(1589734299.798:7): pid=8650 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir611003079/syzkaller.ZrOOli/7/bus" dev="sda1" ino=15770 res=1 [ 262.506878][ T8698] tipc: Enabled bearer , priority 28 16:51:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200000, 0x0) r2 = timerfd_create(0x8, 0x80800) timerfd_settime(r2, 0x0, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 262.614686][ T26] audit: type=1804 audit(1589734299.828:8): pid=8693 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir611003079/syzkaller.ZrOOli/7/bus" dev="sda1" ino=15770 res=1 [ 262.675429][ T8698] tipc: Enabling of bearer rejected, already enabled 16:51:40 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r0 = socket$pppoe(0x18, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a77, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000000)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYBLOB="c7045c087913782669adb96a2d9f28094f287bc308378415ff6821283295fe00ee79d3363f8781a108655d15c7a4ad027e31268c029e72c51dfd522c3547f30a4a3e720096d9da18c065534bd81c3b5906106cd66724f93c73b0d284402c64ab4e060856f766b38e31a8fa73e01ccd01fe76405cfc2b1dbce25b62af774007d05706a98b5d", @ANYRESDEC=r0], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x48c0) [ 262.708015][ T26] audit: type=1804 audit(1589734299.988:9): pid=8692 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir611003079/syzkaller.ZrOOli/7/bus" dev="sda1" ino=15770 res=1 16:51:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c00000013001d040000000000000000080002c0", @ANYRES32=0x0, @ANYBLOB="000000000000000008000a0010002000140003000000000000000000000000ea21000000"], 0x3c}, 0x1, 0x5e}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pwrite64(r2, &(0x7f00000000c0)="5db7f1fc973758c2ba415a1454286bc6fa923ee0aa980a4a078be980ddbe2dfefa82113edd7e5881bbe31c1fab97be85fec221595597c6d2afe3ce00ac4a968f8a2fcca7ce225854063a8e7051879429d3c10cecd5b4b9f2e96a8c89ea532d2d417491cb31d3d1111e8d97900746fd558c4cd401e605e3a437ace4e40c2d49a1822d448bfa5b1bacee3b3b964720e8e48fe60599918f5fef719b8a39713c897dc8dad332064bb00bf1d985ee9f664c049da08d71b95fbf3b91e207fd47c21556ef", 0xc1, 0xfffffffffffffb3e) 16:51:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000401, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000040)='nfs\x00', 0x0, &(0x7f000000a000)) 16:51:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x301000, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f0000000480)={0x2, 0x0, &(0x7f0000000440)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000004c0)={&(0x7f0000000400)=[0x2], 0x1, 0x0, r3}) ioctl$DRM_IOCTL_MODE_ATOMIC(0xffffffffffffffff, 0xc03864bc, &(0x7f0000000240)={0x200, 0xa, &(0x7f00000000c0)=[0x800, 0x6, 0x0, 0x0, 0x4, 0xffff, 0xfffff8dd, 0x9, 0x7, 0x1f], &(0x7f0000000100)=[0x9], &(0x7f0000000140)=[0x8, 0x5, 0x2, 0x3, 0x7, 0x7, 0x2, 0x5, 0x7], &(0x7f0000000200)=[0x20, 0x0], 0x0, 0x7}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) write$P9_RWALK(r1, &(0x7f0000000500)=ANY=[@ANYRESHEX=r0, @ANYRESDEC, @ANYBLOB="796067a144c0a4d63ae439efbb87dc33fe952858fda737820307f9e6cddc61ac4ba45a539b12191ed093c399c2dcb2a05e6ac4e4f4a7960fa9394472f665610960e7f550f81105e94c6ba0f5", @ANYRES64=r0, @ANYRES16, @ANYRESDEC, @ANYRESHEX], 0x8) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x40, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r1, r5) ioctl$VIDIOC_QUERY_EXT_CTRL(r6, 0xc0e85667, &(0x7f00000002c0)={0x40000000, 0x4, "d331324e49f11a53c06588d26979f61a73891ed215cc85dfe66c4010554dd958", 0x3295, 0x1, 0x3ff, 0xffff, 0x6, 0x6, 0xc4, 0x5, [0x7, 0x0, 0x4, 0x6]}) bind(0xffffffffffffffff, 0x0, 0x0) 16:51:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x0, 0x180, 0x180, 0x0, 0x180, 0x248, 0x268, 0x268, 0x248, 0x268, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x46], 0x0, 0xf8, 0x160, 0x52020000, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x4, "cc9e"}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x7}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00', {0xffffffffffffffff}}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$VT_RELDISP(r1, 0x5605) 16:51:40 executing program 0: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r3}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={r3, 0x9, 0xda38, 0x2}, &(0x7f0000000040)=0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, r4}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x33}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) listen(0xffffffffffffffff, 0x400) [ 263.239446][ T8745] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 16:51:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x301000, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f0000000480)={0x2, 0x0, &(0x7f0000000440)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000004c0)={&(0x7f0000000400)=[0x2], 0x1, 0x0, r3}) ioctl$DRM_IOCTL_MODE_ATOMIC(0xffffffffffffffff, 0xc03864bc, &(0x7f0000000240)={0x200, 0xa, &(0x7f00000000c0)=[0x800, 0x6, 0x0, 0x0, 0x4, 0xffff, 0xfffff8dd, 0x9, 0x7, 0x1f], &(0x7f0000000100)=[0x9], &(0x7f0000000140)=[0x8, 0x5, 0x2, 0x3, 0x7, 0x7, 0x2, 0x5, 0x7], &(0x7f0000000200)=[0x20, 0x0], 0x0, 0x7}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) write$P9_RWALK(r1, &(0x7f0000000500)=ANY=[@ANYRESHEX=r0, @ANYRESDEC, @ANYBLOB="796067a144c0a4d63ae439efbb87dc33fe952858fda737820307f9e6cddc61ac4ba45a539b12191ed093c399c2dcb2a05e6ac4e4f4a7960fa9394472f665610960e7f550f81105e94c6ba0f5", @ANYRES64=r0, @ANYRES16, @ANYRESDEC, @ANYRESHEX], 0x8) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x40, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r1, r5) ioctl$VIDIOC_QUERY_EXT_CTRL(r6, 0xc0e85667, &(0x7f00000002c0)={0x40000000, 0x4, "d331324e49f11a53c06588d26979f61a73891ed215cc85dfe66c4010554dd958", 0x3295, 0x1, 0x3ff, 0xffff, 0x6, 0x6, 0xc4, 0x5, [0x7, 0x0, 0x4, 0x6]}) bind(0xffffffffffffffff, 0x0, 0x0) [ 263.625811][ T2996] tipc: 32-bit node address hash set to 24900e57 16:51:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x20, &(0x7f0000000080)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000004c01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:51:42 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fsopen(&(0x7f0000000000)='bpf\x00', 0x0) dup3(r0, r3, 0x0) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$PPPIOCSMRU1(r6, 0x40047452, &(0x7f0000000280)=0x4) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xe0, r5, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x379}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x80}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xeb}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x79}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0xe0}, 0x1, 0x0, 0x0, 0x84}, 0x800) 16:51:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="04010000", @ANYRES16=r2, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x4000040}, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x2, 0x3, "8000000000000045353aca8b53807e3c00"}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_REINJECT_CONTROL(r5, 0xae71, &(0x7f0000000000)={0x2b}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r6 = syz_open_pts(r3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) setpriority(0x2, r7, 0xffffffffffffffff) ioctl$TCSETSF(r6, 0x5412, &(0x7f0000000100)={0x55, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000400)={'filter\x00', 0x4}, 0x68) 16:51:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000002c0)) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x1000) syz_open_dev$loop(0x0, 0x4000000, 0x183e22) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x80460, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_config_ext, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x12, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x109002, 0x190) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8)=0xe00, 0x8000fffffffe) 16:51:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r2, @ANYBLOB="19000000000000001c0012000c000100627269646765"], 0x3c}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x7fff}}]}, 0x40}}, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = socket(0x2, 0x5, 0x6) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}, 0x2c}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xc0d5dfbbbe27b862, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r10 = accept(r9, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r10, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r10, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r4, 0x118, 0x0, &(0x7f00000000c0)=0xfffffffd, 0x4) 16:51:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) quotactl(0x1, &(0x7f0000000200)='./file0\x00', r6, &(0x7f0000000240)="27ef21627906e0cb99a4ea0822147f43ce0683ab6e21e1b44df6571792c23fd8cdfc580b0757191f321cbbdda4a464df5ab4") getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000180)=0x6) [ 265.419434][ T8798] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 265.440561][ T26] audit: type=1800 audit(1589734302.738:10): pid=8797 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15820 res=0 [ 265.530159][ T8804] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 265.579057][ T26] audit: type=1804 audit(1589734302.778:11): pid=8796 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir271201267/syzkaller.XK64AL/7/file0/bus" dev="loop4" ino=24 res=1 [ 265.682034][ T8804] minix_free_inode: bit 1 already cleared [ 265.686412][ T8806] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:51:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x4000000002, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x60082, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3f000000000) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='!\x00') pwritev(r1, 0x0, 0x0, 0xe0000000000) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r5, 0x2, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$rds(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000e80)='xfs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0xaaaaaaaaaaaaa29, &(0x7f0000000c00)=[{&(0x7f0000000880)="487e78d91c2fb1c93b1bada1c911c80e2d675d391bfbe6cdf9f10f83065a2ff1d0f3e233e6953361cdb9111fe174e2114808426d0b416629fc55ba03444842aa1640581a6706927d7f24d0063fbfef52434e39cd8d8fc0fbbc363114c10da481187f4355a373edc92e65379505e15166094384c58f70c97260173fc22fc3e8dc6850297fdc32821b8de13ba306e3510e68d431ffe99a22926e2278e10f0cda629f170b096ab06a29ae52759dfa0a8fcc9b014aadb3fe38dfa0a4125f3ec56dc5339504baabfafad5dff5797df216f2a4c499", 0xd2}, {0x0}, {&(0x7f0000000b00)='Z', 0x1, 0x6}, {&(0x7f0000000b80)="43298ef5797ef8b148cd1e414c6d0f7c2722e354dddeb30533a8bd34ea3f2e073e06341e5d91f9fca85e3494e451f8ff2a130f74099eb984780625e403b2cbe1e89341ee62348bd3f89e74d82c10d4126cfbbbf3927aa5a3eead9eb1f31aa33200", 0x61}], 0x2a88809, 0x0) [ 265.761066][ T26] audit: type=1800 audit(1589734302.778:12): pid=8796 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="loop4" ino=24 res=0 16:51:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000880)={0x0, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x64000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x8100, 0x0, 0x1000, 0x0, 0x1, 0x0, 0x3f}, 0x0, 0x1, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/tcp6\x00') getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ubi_ctrl\x00', 0x402801, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000840)=0x1, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "50ce2281e2d4986d0adf909155c26f4e71eff93b"}, 0x15, 0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={r2, 0x80000001, 0x30}, 0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x1f}, 0x8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x80000001) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x0) 16:51:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x80000001}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x50845}, 0x20008810) dup(r1) sendmsg(r1, &(0x7f0000000340)={&(0x7f0000000100)=@rc={0x1f, @fixed={[], 0x11}, 0x9}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000400)="2d2a7779946b1fb35d32d16c3d5932054fdacc9fe078a96f84cd36059b755f7c0a599016f991b9194581fd30baee266505179237508e0ea3e0a3f8be47220196a702204aae67a213688ee204c64fcdbe9417ba4298dbf9bddc583691e53d41c23fdf0e340ece14dc", 0x68}], 0x1, 0x0, 0x1010}, 0x40000) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_FREE(0xffffffffffffffff, 0x4112, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @private=0xa010101, 0x0, 0x0, 'sh\x00', 0x18, 0x0, 0x3a}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) gettid() pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r3) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000002880)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002840)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000828bd700bfedbdf25110000000800a400010000000c004300ffffff481dd26df468b480a5f8301755f984a0ff05ba4605f1000000000000000000", @ANYRES32=0x0, @ANYRESDEC], 0x5}, 0x1, 0x0, 0x0, 0x8801}, 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280), &(0x7f00000002c0)=0x8) connect$inet6(r4, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @dev, 0x9}, 0x1c) splice(r2, 0x0, r3, 0x0, 0x100000002, 0x0) [ 266.027919][ T8804] Process accounting resumed 16:51:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) quotactl(0x1, &(0x7f0000000200)='./file0\x00', r6, &(0x7f0000000240)="27ef21627906e0cb99a4ea0822147f43ce0683ab6e21e1b44df6571792c23fd8cdfc580b0757191f321cbbdda4a464df5ab4") getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000180)=0x6) 16:51:43 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x1d}, 0x16, 0x1) splice(r2, 0x0, r3, 0x0, 0x1420000a77, 0x0) ioctl$CAPI_GET_PROFILE(r2, 0xc0404309, &(0x7f0000000080)=0x695a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000, 0x9, 0x3f, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 266.319845][ T26] audit: type=1804 audit(1589734303.618:13): pid=8839 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir271201267/syzkaller.XK64AL/7/file0/bus" dev="loop4" ino=24 res=1 16:51:43 executing program 4: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r3, 0x3b72, &(0x7f0000000040)={0x18, 0x4, 0x6, 0xd2d}) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000080)) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000240007e7ffff0777e0d7d774fd40ac00", @ANYBLOB="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", @ANYBLOB="c6f3cd7cf19e3a5501e8ffff081fb1770ac07ce8a8000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES32=r4, @ANYBLOB="0000000000010072738f70d2810000200002000800010000000c0014000200000000000000000000000000000000000b6b94a816687cecdb1f99a796579fca7231a9aab5293daaaf42dbbfe4e46c66b47d87d4f7f3c740359982845c"], 0x50}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 16:51:43 executing program 1: r0 = getpid() personality(0x6) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r3, 0x8001a0, 0x1c, 0x0, &(0x7f0000000380)="4d50b441e692763513ef874588a8ffffffff00000004122e25d30806", 0x0, 0x403, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x15) write$vhost_msg_v2(r4, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) write$FUSE_DIRENT(r4, &(0x7f00000003c0)={0xa0, 0x2dc9127aec631d4d, 0x2, [{0x6, 0xe, 0xa, 0x9, 'syzkaller\x00'}, {0x5, 0x6, 0x2, 0x9, '!('}, {0x6, 0x80000001, 0xa, 0x0, 'syzkaller\x00'}, {0x1, 0x2, 0x3, 0x80000000, '}{&'}]}, 0xa0) [ 266.525220][ T8845] MINIX-fs: mounting unchecked file system, running fsck is recommended 16:51:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000200200000000000000100000800040000000000", 0x24) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000280)={r5}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000000)={r5, 0x44, 0xfffa}, &(0x7f0000000040)=0x8) [ 266.577513][ T26] audit: type=1800 audit(1589734303.618:14): pid=8839 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="loop4" ino=24 res=0 16:51:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffff0001, 0x100000000}, 0x0, 0x0, 0x6, 0x0, 0xfc, 0x400000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000240)={{0x6, @default}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}, 0x48) listen(r0, 0x0) r1 = syz_open_dev$vcsa(0x0, 0x6ef, 0x501400) unshare(0xab3b4e57a7dfa4e9) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080), 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0xb209}, 0x8) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = accept(r0, 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=""/200, 0xc8) write$binfmt_elf64(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x35) [ 266.731396][ T26] audit: type=1800 audit(1589734303.758:15): pid=8845 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15810 res=0 16:51:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) quotactl(0x1, &(0x7f0000000200)='./file0\x00', r6, &(0x7f0000000240)="27ef21627906e0cb99a4ea0822147f43ce0683ab6e21e1b44df6571792c23fd8cdfc580b0757191f321cbbdda4a464df5ab4") getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000180)=0x6) [ 266.787400][ T8841] Process accounting resumed [ 266.795521][ T8868] Unknown ioctl 15218 [ 266.822501][ T8868] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 266.826075][ T7099] minix_free_inode: bit 1 already cleared [ 266.859852][ T8868] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 266.898110][ T8871] Unknown ioctl 15218 16:51:44 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r5, 0x0, 0x1420000a77, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000200)={0x8, 0x7, 0x4, 0x4000420, 0x2, {0x0, 0xea60}, {0x2, 0x4, 0x1, 0x3f, 0x2, 0x40, "76ff9fa1"}, 0x74fa9a5e, 0x2, @offset=0x7ff, 0x3, 0x0, 0xffffffffffffffff}) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) bind$rxrpc(r7, &(0x7f0000000040)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e21, @empty}}, 0x24) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') [ 266.917627][ T8871] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 266.928767][ T8871] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 267.045224][ T26] audit: type=1800 audit(1589734304.348:16): pid=8879 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15827 res=0 [ 267.100317][ T8879] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 267.156114][ T8879] Process accounting resumed [ 267.180558][ T8879] minix_free_inode: bit 1 already cleared 16:51:44 executing program 1: r0 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x4, 0x0, 0x0, 0x2000000, 'syz0\x00'}, 0x6, 0x1, 0x0, r0, 0x1, 0x0, 'syz0\x00', &(0x7f0000000140)=['/dev/kvm\x00'], 0x4, [], [0x9ca, 0x0, 0x84, 0x1ff]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000840)='/dev/null\x00', 0x494140, 0x0) r2 = getpid() r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r3, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x7, &(0x7f00000004c0)=""/235) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000600)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)=ANY=[@ANYRESOCT=r0, @ANYRES16=r4, @ANYBLOB="01000000e330feffd51d91a1e8398d377692696d300000000000000000000044669d1743a4f926e4"], 0x44}}, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r5, 0x0) ioctl$int_in(r5, 0x800000c0045005, &(0x7f0000000040)=0x10) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r6, 0x4040ae70, &(0x7f00000002c0)={0x5, 0x4fb, 0x9, 0x4}) write$FUSE_INTERRUPT(r5, &(0x7f0000000080)={0x10, 0x0, 0x8}, 0x10) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x8491) clock_gettime(0x1, &(0x7f0000000640)) ioctl$KVM_GET_DEBUGREGS(r6, 0x8080aea1, &(0x7f0000000300)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) clone3(&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, {0x18}, 0x0, 0x0, 0x0, 0x0}, 0x50) 16:51:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) quotactl(0x1, &(0x7f0000000200)='./file0\x00', r6, &(0x7f0000000240)="27ef21627906e0cb99a4ea0822147f43ce0683ab6e21e1b44df6571792c23fd8cdfc580b0757191f321cbbdda4a464df5ab4") getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000180)=0x6) 16:51:44 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r1, 0x0, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), 0x4) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000040)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 267.435221][ T26] audit: type=1800 audit(1589734304.728:17): pid=8897 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15811 res=0 [ 267.482426][ T8897] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 267.535876][ T8897] Process accounting resumed [ 267.550592][ T8863] syz-executor.2 (8863) used greatest stack depth: 21168 bytes left [ 267.551934][ T8897] minix_free_inode: bit 1 already cleared 16:51:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) r3 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r5, 0x0, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @remote}, &(0x7f00000002c0)=0xc) sendmsg$nl_route(r3, &(0x7f0000000880)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=@ipv4_deladdr={0x90, 0x15, 0x100, 0x70bd29, 0x25dfdbfd, {0x2, 0x1f, 0x36, 0xc8, r6}, [@IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x200}, @IFA_FLAGS={0x8, 0x8, 0x80}, @IFA_LABEL={0x14, 0x3, 'vlan0\x00'}, @IFA_BROADCAST={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3e}}, @IFA_LOCAL={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2e}}, @IFA_CACHEINFO={0x14, 0x6, {0x1, 0x3, 0x8, 0xb6bc}}, @IFA_LABEL={0x14, 0x3, 'ipvlan1\x00'}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x10000, 0x9, 0x80}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4008000}, 0x8000) perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x70, 0x1f, 0xaf, 0x3f, 0xe, 0x0, 0x8, 0x40002, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x181d, 0x3, @perf_bp={&(0x7f0000000000), 0xb}, 0x0, 0xb, 0xf8000000, 0x9, 0x4, 0x5, 0x200}, r1, 0x1, r2, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xed) ioctl$UI_DEV_CREATE(r0, 0x5501) 16:51:45 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x88b02, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x1c, 0x0, 0x4}, 0x1c}}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa8100000086dd609faa7d00442f00fe8000000000000000000000000000aaff0200010420880b0000000000000800000086dd"], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$BINDER_SET_CONTEXT_MGR(r7, 0x40046207, 0x0) 16:51:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) quotactl(0x1, &(0x7f0000000200)='./file0\x00', r6, &(0x7f0000000240)="27ef21627906e0cb99a4ea0822147f43ce0683ab6e21e1b44df6571792c23fd8cdfc580b0757191f321cbbdda4a464df5ab4") 16:51:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x18000, 0x0) openat$cgroup_ro(r2, &(0x7f0000000140)='pids.current\x00', 0x0, 0x0) close(r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x40) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000100)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030009009e40f086dd1fffffe100000900632f77fbac141412e4000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42459416a2e10c91196b1fd38f20b33", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffd4e, 0x3f, &(0x7f00000003c0)="72f96c45dbbfc718cb63c344dc932c35b23ac7a55a84b29e1150c8c6d937a55799784a2898bcba36e772a1"}, 0x28) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)) 16:51:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x80) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r6, 0x0, 0x0) r7 = accept$inet(r6, 0x0, &(0x7f0000000400)) pidfd_getfd(r4, r7, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x3c1, 0x3, 0x328, 0x0, 0x168, 0x0, 0x168, 0x0, 0x258, 0x250, 0x250, 0x258, 0x250, 0x7fffffe, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x128, 0x168, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'rose0\x00', {0x24, 0xde030000, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "48c01c5140d722edd3fb24545886bbd1be494201b400"}}}, {{@ipv6={@local, @ipv4={[], [], @multicast1}, [], [], 'netdevsim0\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x388) [ 268.048187][ T26] audit: type=1800 audit(1589734305.338:18): pid=8932 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15825 res=0 [ 268.119084][ T8932] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 268.148813][ T8932] Process accounting resumed [ 268.155573][ T8932] minix_free_inode: bit 1 already cleared [ 268.207711][ T8945] input: syz1 as /devices/virtual/input/input5 16:51:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r5, 0x4080aebf, &(0x7f0000000000)) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r9, 0x4080aebf, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f00000000c0)={0x9, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r5, r0, r6, r1, r2, r1, r9]}, 0x9) write$cgroup_pid(r3, &(0x7f00000036c0), 0x12) r10 = open(&(0x7f0000000040)='./bus\x00', 0xc0000, 0x142) ftruncate(r10, 0x2008002) sendfile(r2, r10, 0x0, 0x200fff) 16:51:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) quotactl(0x1, &(0x7f0000000200)='./file0\x00', r6, &(0x7f0000000240)="27ef21627906e0cb99a4ea0822147f43ce0683ab6e21e1b44df6571792c23fd8cdfc580b0757191f321cbbdda4a464df5ab4") 16:51:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)={0xc4, 0x4, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x101}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffffffff80000000}]}, @NFTA_CHAIN_HOOK={0x2c, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'bond0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'bond_slave_1\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x3}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x3}, @NFTA_CHAIN_HOOK={0x28, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x261478de}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x51146b38}, @NFTA_HOOK_DEV={0x14, 0x3, 'bond_slave_0\x00'}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}]}, 0xc4}, 0x1, 0x0, 0x0, 0x538d692e9bd82a36}, 0x4004000) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0100000000000000240012000c000100627269646765000e140002000800070000000000080027"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0x7}]}}}]}, 0x3c}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20000000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0100000000000000240012000c000100627269646765000e140002000800070000000000080027"], 0x44}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0x7}]}}}]}, 0x3c}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'veth1_virt_wifi\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000001800)=@mpls_delroute={0xf8, 0x19, 0x10, 0x70bd2d, 0x25dfdbfc, {0x1c, 0x0, 0x0, 0x86, 0xff, 0x2, 0xc8, 0x4, 0x1100}, [@RTA_VIA={0x14, 0x12, {0x6, "f3d7358404696fd0f35c482cc83a"}}, @RTA_OIF={0x8, 0x4, r4}, @RTA_DST={0x8, 0x1, {0x6ec0, 0x0, 0x1}}, @RTA_MULTIPATH={0xc, 0x9, {0x8723, 0x2c, 0x2, r8}}, @RTA_VIA={0x14, 0x12, {0x11, "fffffffb00"}}, @RTA_MULTIPATH={0xc, 0x9, {0x64, 0x0, 0x2, r9}}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x1}, @RTA_NEWDST={0x84, 0x13, [{0x8001}, {0x7}, {0x5, 0x0, 0x1}, {0x50, 0x0, 0x1}, {0x1000, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x81, 0x0, 0x1}, {}, {0x7fff, 0x0, 0x1}, {0x3}, {0x9}, {0x9}, {0x81}, {0xf4ed5, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x5}, {0x9, 0x0, 0x1}, {0x2}, {0x7, 0x0, 0x1}, {0xffffc, 0x0, 0x1}, {0x20, 0x0, 0x1}, {0x3}, {0x5}, {0x1f, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0x20}, {0x5}, {0x4, 0x0, 0x1}, {0x7ff}, {0xffffd}, {0x80}, {0x5}]}]}, 0xf8}}, 0x0) [ 268.491732][ T26] audit: type=1800 audit(1589734305.788:19): pid=8963 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15814 res=0 [ 268.523299][ T8969] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 268.532798][ T8969] netlink: 'syz-executor.3': attribute type 39 has an invalid length. [ 268.556131][ T8969] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 268.565360][ T8969] netlink: 'syz-executor.3': attribute type 39 has an invalid length. [ 268.587382][ T8963] MINIX-fs: mounting unchecked file system, running fsck is recommended 16:51:45 executing program 5: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040), 0x4000) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0xffdbc494) unlink(&(0x7f00000001c0)='./file0\x00') ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x401, 0x9, 0x100, 0x2, 0x1b, "e4fef5acf9bd39fd86ae55ee74d7e904ff63ae"}) [ 268.627425][ T8963] Process accounting resumed [ 268.677559][ T8963] minix_free_inode: bit 1 already cleared 16:51:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) r3 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r5, 0x0, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @remote}, &(0x7f00000002c0)=0xc) sendmsg$nl_route(r3, &(0x7f0000000880)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=@ipv4_deladdr={0x90, 0x15, 0x100, 0x70bd29, 0x25dfdbfd, {0x2, 0x1f, 0x36, 0xc8, r6}, [@IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x200}, @IFA_FLAGS={0x8, 0x8, 0x80}, @IFA_LABEL={0x14, 0x3, 'vlan0\x00'}, @IFA_BROADCAST={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3e}}, @IFA_LOCAL={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2e}}, @IFA_CACHEINFO={0x14, 0x6, {0x1, 0x3, 0x8, 0xb6bc}}, @IFA_LABEL={0x14, 0x3, 'ipvlan1\x00'}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x10000, 0x9, 0x80}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4008000}, 0x8000) perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x70, 0x1f, 0xaf, 0x3f, 0xe, 0x0, 0x8, 0x40002, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x181d, 0x3, @perf_bp={&(0x7f0000000000), 0xb}, 0x0, 0xb, 0xf8000000, 0x9, 0x4, 0x5, 0x200}, r1, 0x1, r2, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xed) ioctl$UI_DEV_CREATE(r0, 0x5501) 16:51:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) [ 268.924106][ T8994] input: syz1 as /devices/virtual/input/input6 [ 268.998153][ T9001] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 269.065714][ T9001] Process accounting resumed [ 269.097587][ T9001] minix_free_inode: bit 1 already cleared [ 269.577137][ T8997] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 269.599896][ T8997] netlink: 'syz-executor.3': attribute type 39 has an invalid length. 16:51:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) [ 269.831138][ T9023] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 269.892709][ T9020] Process accounting resumed 16:51:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8923, &(0x7f0000000140)={'syzkaller1\x00', {0x10, 0x0, @empty=0x300}}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) 16:51:47 executing program 2: setreuid(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6572726f72733d72656d4fd11b742d726f2c007d31d028813593e532f32e20f0373fed218bd3e57847bb5a956204a2ac1aee43786909ff653c7eec6ba1da8722e3597657"]) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = dup(r1) sendmsg$sock(r2, &(0x7f00000004c0)={&(0x7f0000000000)=@llc={0x1a, 0x137, 0xc2, 0xc1, 0x1, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000080)="d35628fc7f269e22267cb640c76c0295961f04cbd18cca5c8cce342a7735422516697c742deb3ab7dcf19327716d25ced0a365649fb2876482c6b04975f3f7845c78480aa8aa3e1126163a4e6bd17e86ffebc9972340418a0aa540630000000000", 0x61}, {&(0x7f0000000100)="32f202c8f45a57ba69af10f21089e5012c0c943ec1f3352b53818ba1c8a95af7ebb4d8", 0x23}, {&(0x7f0000000180)="7c98d9bde74aa27c657054c8bb6b86d2858adea2802a55320ca9193ff3992de74e5a5832d7e7f6a2c6410eb7d313c734c1b1f3334762843cf36913902f5524e3a0adae47568dfd6efb84b750538d6e55985a8cd73dc4bb0ef0fa211a3260603350cd43c445ac06ab3ebb0efca63329357481eb6c25beb7d0e244d92f2611b897d73bbfa93a37e6b20ca84e2aa73f55d7c639", 0x92}, {&(0x7f00000002c0)="f4311bef2757707579ba8a76e26137989438cd8a6679e452731e837adf03b3139b8865c70310e595318671b286e583a4f0925d153b6580869d3703b1fc0669ce1d7955516342d659b8f14cdf02b4f027294e95ab98cfdf9d857e8b4448e8605252eae38ed685ad0fdd6b5520684725aee622c56d8a1b488cb5ee8b425aedf319b32837768f94a279a69f121dcd81671f80683e49e4e3179517952900d6ed55501e619f162e1897898da88a1d5df3126640941693", 0xffffffde}, {&(0x7f0000000240)="dca26df0425c3a9101fa8a3358c1e7e2ff42e5f7bfc78ff345a83ced20cc3bd519cc51fef08054f359532da0", 0x2c}], 0x5, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x3ff}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0xa5cb}}, @mark={{0x14, 0x1, 0x24, 0x80}}, @txtime={{0x18, 0x1, 0x3d, 0x400007}}, @mark={{0x14, 0x1, 0x24, 0x2}}], 0xa8}, 0x1004) [ 269.913482][ T9020] minix_free_inode: bit 1 already cleared [ 270.060122][ T9031] JFS: remOÑt-ro is an invalid error handler 16:51:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 270.170817][ T9031] JFS: remOÑt-ro is an invalid error handler [ 270.261282][ T9056] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 270.301067][ T9056] Process accounting resumed [ 270.306390][ T9056] minix_free_inode: bit 1 already cleared 16:51:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @xfrm={{0x9, 0x1, 'xfrm\x00'}, {0x4}}}]}, 0x34}}, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) accept(r3, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0100000000000000240012000c000100627269646765000e140002000800070000000000080027"], 0x44}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0x7}]}}}]}, 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000080)={'team0\x00', r7}) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) mq_timedreceive(r1, &(0x7f0000000100)=""/235, 0xeb, 0x10001, &(0x7f0000000040)={r8, r9+10000000}) 16:51:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 270.584375][ T9076] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 270.597319][ T9076] netlink: 'syz-executor.5': attribute type 39 has an invalid length. [ 270.612262][ T26] kauditd_printk_skb: 3 callbacks suppressed 16:51:47 executing program 2: accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f00000001c0)="660fc7b10000000048b800080000000000000f23c00f21f835030000000f23f836260fc79d5eb600793e66410f38825ea3eec4c241ae8cfe00780000f4c4a1f950e066baa00066b8000066ef0f01c5", 0x4f}], 0x1, 0x35, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000000)=0x7f, 0x4) r3 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x4, 0x111000) write$binfmt_elf64(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="8e74242f09c335748b2d29efb2a68b37430cf3a610aab285f89da453a3bee2706447182c96bb9e3017b1b49fb24c46e50f6f7059e712e8291f316f555766f92bebeef2741eeaa0c184b87f82a3281b0ce597253f0e13ae925c0178950f6eba1f4df05c6882d2aab9eaecfe6312e94355d773deef49a5ff0c98125b5e8786a8fb0800fb9d0ff3482a94fc215e688d562988bbbcecea166ad376d7a12e144fb148e409fa3e88769f2ff52708b7d1ed5a42e1f9d3722dc677c70c1862b7b07fb8689c050000005952ae0696c405d3d22bb04a24d2a30000000051d8dc46021aab922162b0047ca1356ca190df1cc5d38b56513c70596c99c8d3eee6181ae5c0ee7c710193d6f5f54d3e628cfb00f0ef663ef4a1d667ac18bd08a6d3c3863a34514c13080ac13e0c35ba838c8a448e9a3f9c121586219f711aa3b694c8cd801cfd2a943ec171548e321723db5795e403d6bc09407660a1039726e1e469979f110986ead0209d78f832ba1e4495e70b9438a27d497ff118d207e4725352f6eb628bdc0d39713946f571e99d92bc34d37024c279d576ae893c3d3f57099c5f9737b6bc670b9f0ade3c84ef759f0de1903345203a4e96847d6f40200c588b2349"], 0xfc66) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)={0x5, [0x100000000, 0x10000, 0x0, 0xf8e, 0x6]}) [ 270.612276][ T26] audit: type=1800 audit(1589734307.908:23): pid=9077 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15811 res=0 16:51:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0100000000000000240012000c000100627269646765000e140002000800070000000000080027"], 0x44}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0x7}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@newneigh={0x5c, 0x1c, 0x8, 0x70bd28, 0x25dfdbfd, {0x2, 0x0, 0x0, r6, 0x40, 0x91, 0xa}, [@NDA_PROBES={0x8, 0x4, 0x4}, @NDA_PROBES={0x8, 0x4, 0x24a11766}, @NDA_DST_IPV6={0x14, 0x1, @empty}, @NDA_DST_IPV4={0x8, 0x1, @empty}, @NDA_VNI={0x8, 0x7, 0xff}, @NDA_LLADDR={0xa, 0x2, @random="ff0fe7ff9b26"}]}, 0x5c}}, 0x0) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) [ 270.661362][ T9077] MINIX-fs: mounting unchecked file system, running fsck is recommended 16:51:48 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r2, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r2, &(0x7f0000000240), 0x0}, 0x20) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000040)="25bca274769e620a2734fa0095e06f2687ecb86a54a10f0040000000000000004e4d98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7573726a71756f74613d6064656275675f77616e745f65787472615f6973697a653df8c3303030303030303030303030303030302c67727071756f7461"]) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000280)) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB='my\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x33c}, 0x1, 0x0, 0x0, 0x20000801}, 0x80) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)={0x344, r3, 0x2, 0x70bd28, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0xc4, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xec}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5496bf22}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e10f2d0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4c25da08}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf6}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xda}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc9}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x41345dc8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1f8dcbd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x81}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x79}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x18}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x17}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x26562169}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11a40197}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x758d5730}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0x10c, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf861}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5288fbfc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1599e3bf}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xab80}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76f30a3c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9cb5}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x15849686}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x18b172c8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x35d6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6d2c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x402a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2b0a1a24}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbe65}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb96f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7feda2ce}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9c8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3642}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc639}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34c8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7b0b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5c694d9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x523e01b1}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5ff0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6b7e99ba}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29b04999}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55cfd331}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa08d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf43}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3e660298}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x104, 0x8, 0x0, 0x1, [{0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e93ba14}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xc0becf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3162a4ee}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7f4a7ee5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x756a0507}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x8f5032}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x339436fc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2bf28421}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x60}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x336639c6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x60a09683}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7285a0fa}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb7}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4874d11c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x65c18cac}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x15}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x12fb51e1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa0}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x54461f9f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x166b9b42}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x50e4155d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a3bd0e1}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0xbc86e89d54e1cc4e}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x344}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) [ 270.715589][ T9075] Process accounting resumed [ 270.721679][ T9075] minix_free_inode: bit 1 already cleared 16:51:48 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x107040, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x1420000a77, 0x0) renameat(r3, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') setuid(r2) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) splice(r5, 0x0, r6, 0x0, 0x1420000a77, 0x0) ioctl$CAPI_SET_FLAGS(r5, 0x80044324, &(0x7f0000000140)=0x2) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) close(0xffffffffffffffff) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="018d0007", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r8}, &(0x7f00000003c0)=0x8) socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001300)=ANY=[@ANYRES64, @ANYBLOB="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"], 0x1008) 16:51:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) [ 270.919581][ T9087] netlink: 'syz-executor.4': attribute type 7 has an invalid length. [ 270.948157][ T9087] netlink: 'syz-executor.4': attribute type 39 has an invalid length. 16:51:48 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0xa, 0x3, 0x87, &(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000000)=""/182, 0xb6}, {&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000200)=""/174, 0x59}, {&(0x7f0000001400)=""/91, 0x4f}, {&(0x7f0000001480)=""/136, 0x88}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x6, 0x4) [ 271.048159][ T26] audit: type=1800 audit(1589734308.348:24): pid=9104 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15843 res=0 [ 271.088558][ T9104] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 271.163667][ T9104] Process accounting resumed 16:51:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f35ecdb4cb92e0c480e000d000000e8bd6efb250309000e000100244e48ff050405001201", 0x2e}], 0x1}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE_wg(r4, 0x1, 0x19, &(0x7f00000000c0)='wg1\x00', 0x4) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000240)={0x0, 0x9, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000200)={0xa2090b, 0x49, [], @value64}}) fcntl$notify(r5, 0x402, 0x4) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000140)=0x549f, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={r6, 0x3ff}, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={r7, 0x401}, &(0x7f0000000180)=0x8) ioctl$SNDCTL_DSP_POST(0xffffffffffffffff, 0x5008, 0x0) sendmmsg(r4, &(0x7f00000038c0), 0x4000000000000a8, 0x0) getsockopt$bt_hci(r4, 0x0, 0x2, &(0x7f0000000140)=""/130, &(0x7f0000000040)=0x82) [ 271.186426][ T9104] minix_free_inode: bit 1 already cleared [ 271.197811][ T9097] EXT4-fs (loop1): old and new quota format mixing 16:51:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c001280100001006366687307000000000000000800030002000000"], 0x3c}}, 0x0) 16:51:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) accept$inet(r4, 0x0, 0x0) [ 271.425194][ T9122] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 16:51:48 executing program 5: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x19, 0x0) socket$kcm(0x29, 0x5, 0x0) syz_genetlink_get_family_id$netlbl_cipso(0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x18, r2, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}}, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r2, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @empty}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x40) clone(0x105480, &(0x7f0000000400)="f47ee1edf28bdbc78ddd89d63de01465bc2dc29ba576bef7f3a930bed156d5ad39fbf573c7efc1b6b14559557e8878ecc102909affdf3b0fa53c17f0f074174ed9d0ea15c3eba5ebae0308027c9cc133d17c8eee7d1ed2961f297c10bfd7f3b93cbe60aef46b05c173c106ecaf4f17f6dc76a461990f69c9259cf9607dc101e2bfa5bfb41b1d7cecd338d03c359a0e7de51ec6826aa0b55d6a58d9677e8d13da8e01f404df9365582c3ee8029890b19b5bf74422ee3ff7c83736f28c07c0b184448dd473939be37609ac24b166dde12af33ac91f5fec", &(0x7f0000000100), &(0x7f0000000280), &(0x7f0000000500)="3449994b75b06caba381232316750858d38aece8a940549da60db3a79250dcc42c29663ca4cec1224f52a2c2732498b5616d09d27fcb017a31a45df08c53b4ff921a2af1298e71a342a9bf0f1bae7b504c2929bdbd8d3c28bab1f43e8c06ed2163c28b3cf2ce5762af7048bd34b99675773514f764bc15055d81e1904fb5a583b8c64472ad2dbbcb15615d44ad954c31d9efdde1dd5823cd3b4850de89e3d1de33b54dc7c31106613604b2eb5cecb5881c") ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000000c0)=0x4) r3 = dup(0xffffffffffffffff) ioctl$MON_IOCX_GET(r3, 0x40189206, &(0x7f0000000680)={&(0x7f0000000340), &(0x7f00000005c0)=""/173, 0xad}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x400120c0, 0x0) ioctl$SIOCGSTAMP(r4, 0x8906, &(0x7f0000000000)) [ 271.481922][ T9127] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.493513][ T9127] bridge0: port 1(bridge_slave_0) entered disabled state 16:51:48 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x4, @perf_bp={0x0}, 0x0, 0x80003, 0x40, 0x7, 0x5, 0x0, 0xfffd}, 0x0, 0x6, 0xffffffffffffffff, 0x0) getpgrp(0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x48}]}, &(0x7f0000001400)='GPL\x00', 0x4, 0x100f, &(0x7f00000003c0)=""/4111, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40c00, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000140)={@local, @multicast1, 0x0}, &(0x7f0000000200)=0xc) r5 = open(&(0x7f0000000100)='./file0\x00', 0x80040, 0x20) name_to_handle_at(r5, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x66, 0x6, "99f96a04a5644d7ecb270156712eef4e178ea92a149405926524c855abca1abdc00501456818dd417d7be0fd54e40c593afeb5713194ce40e698b7541f208bedb872f2e85ac89583ada125783ef74239d704b9d49fd00fc686320f557497"}, &(0x7f0000000340), 0x400) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000240)={@private1={0xfc, 0x1, [], 0x1}, r4}, 0x14) [ 272.047236][ T9159] xt_CT: No such helper "syz1" [ 272.128495][ T9160] xt_CT: No such helper "syz1" [ 272.256484][ T9122] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 272.298539][ T9122] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.305747][ T9122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.313197][ T9122] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.320467][ T9122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.352140][ T9129] Process accounting resumed 16:51:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) accept$inet(r4, 0x0, 0x0) [ 272.414248][ T7099] minix_free_inode: bit 1 already cleared [ 272.668986][ T26] audit: type=1800 audit(1589734309.968:26): pid=9183 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15848 res=0 16:51:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xfffffffffffffeb4}], 0xb3e, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r3, 0x323}, 0x14}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x20, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:51:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f00000003c0)={0x0, 0x0, 0x34975096}) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r0 = dup(0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) syz_open_dev$vcsn(0x0, 0x80000000, 0x0) chdir(&(0x7f0000000240)='./file0\x00') sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYRES64], 0x1}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) accept(r2, 0x0, 0x0) connect$pppl2tp(r1, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @private=0xa010100}, 0x4, 0x0, 0x1, 0x2}}, 0x2e) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$FS_IOC_SETVERSION(r3, 0xc0c0583b, &(0x7f0000000080)) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') [ 272.737609][ T9183] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 272.855680][ T9132] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.862885][ T9132] bridge0: port 1(bridge_slave_0) entered disabled state 16:51:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="a40200001200"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008002c0000000000580012800b0001006d616373656300004800028005000b000000000005000600000000000500060000000000050006000000000005000c000000000005000d00000000000c000100000000000000000005000800000000000a0001000180c2000000000008001f0000000000080025000000000008001a8004000700"], 0xa4}}, 0x0) pipe2(&(0x7f00000004c0), 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 16:51:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) splice(r3, 0x0, r4, 0x0, 0x1420000a77, 0x0) ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c00000030003307000000000000000000000000380001003400010009000100766c616e00000000200002801c0002"], 0x4c}}, 0x0) socket(0x11, 0x800000003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) dup(0xffffffffffffffff) 16:51:50 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) splice(r5, 0x0, r6, 0x0, 0x1420000a77, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r9, 0x4080aebf, &(0x7f0000000000)) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r5, r9}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x2c, r10, 0xffff, 0x0, 0x0, {0x6}, [@ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}]}, 0x2c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 16:51:50 executing program 1: syz_open_dev$sndpcmc(0x0, 0x1000, 0x101800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x41c1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet(0x2, 0x5, 0x0) close(r1) 16:51:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) accept$inet(r4, 0x0, 0x0) [ 273.220605][ T9187] Process accounting resumed [ 273.231256][ T9201] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 16:51:50 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r0, 0x80984120, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x111b42, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') write$UHID_INPUT2(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0c0000200311518e859c2d02c9a38d8051e9e0c2c2be74bca057523d47a3b9b8d517bebef6cedc450900004d3b7de48d75becc0b519599e59ec9bd74c05ab13fb9beb1b56b3c5ea11d253a355740c6a2198a8c97b65f07e725828af53d4a9315adcf5d246fc552e26a6efc06145ef51900"/125], 0x9) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') shmget$private(0x0, 0xf000, 0x0, &(0x7f0000000000/0xf000)=nil) readv(r2, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) [ 273.287367][ T7099] minix_free_inode: bit 1 already cleared [ 273.337623][ T9201] EXT4-fs (loop5): orphan cleanup on readonly fs [ 273.370124][ T9201] EXT4-fs error (device loop5): ext4_orphan_get:1268: comm syz-executor.5: bad orphan inode 6 [ 273.389230][ T9201] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 273.449018][ T26] audit: type=1804 audit(1589734310.748:27): pid=9220 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir993380686/syzkaller.LaHUE1/18/cgroup.controllers" dev="sda1" ino=15846 res=1 16:51:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000440)=ANY=[@ANYBLOB="e3"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$inet6(r0, &(0x7f0000001840)={&(0x7f0000000000)={0x2, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @empty}, r2}}}], 0x28}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x410000, 0x0) write$P9_RFSYNC(r3, &(0x7f00000000c0)={0x7, 0x33, 0x1}, 0x7) [ 273.674199][ T26] audit: type=1800 audit(1589734310.968:28): pid=9229 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15850 res=0 [ 273.754550][ T9231] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 273.793732][ T9229] Process accounting resumed [ 273.801662][ T9229] minix_free_inode: bit 1 already cleared 16:51:51 executing program 3: socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001740)=""/102400}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefffff0ff000000001ae5f8954a3df6cb82bf5697b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d0000006b00"/112], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) socket$kcm(0x10, 0x2, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) 16:51:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(0xffffffffffffffff, 0x0, 0x0) [ 273.976898][ T9239] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:51:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4a20, 0x0, @mcast1, 0x6}, 0x4b) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0x1f, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x8}, 0x1c) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0x3) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) [ 274.032166][ T26] audit: type=1800 audit(1589734311.328:29): pid=9244 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15854 res=0 16:51:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) splice(r4, 0x0, r5, 0x0, 0x1420000a77, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f0000000140)={0xfffffff, 0x8000, 0x5, r7, 0x0, &(0x7f0000000100)={0x980907, 0x4, [], @p_u16=&(0x7f00000000c0)=0x5}}) sendmmsg(r8, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000180)="ba2991615cbab44d19247daf3cf0d5750b3233582a5c49aefe45d832fe751b36eab0753e7755d2c7603bc9f88fceee978ae38e8930736b2de7a2906eb0b77ff9d5e3f03292ad98e405c994df37cf8b6c6c4b409c4875fb789634e19ca247775ce0dad8374159fc42f61269581a5df62a4741d4b19a8de103f7e686af635ea613a0546baa5af90ddc920fd3302d5db5bcae0c84129e09a1bf2c618f642e633102c522e700d9ee31497cda81dff820b2bc696f578f362da4d7e9ffab7641c5a662def2029ea6b1d1dec01a8e6b6a3ac1325eecf6e84434d5678a08183a20edf728eec531911227c66c2bf253cf6063ed32f256f678680f078cabbf", 0xfa}, {&(0x7f0000000300)="0f68cbe589dfa01848a04bdadca1744afec60f24c1f04051b928fa5dddafef0a3de41f83dec9062f9c034607cdea312633891372e4df85c3185bc3a2021c559d2a6006426677e3254a24c78f784bb15a3ed38ee090942d6747698e46ae15c80f0562ba910fd3db54b006546477", 0x6d}, {&(0x7f00000003c0)="159f6ace7b3ab074fbe8760c3c6936492894891235badd7de60169c4b1ebe7be1fa479aa272efc931f22686b74da233dd27ce327b785863c9afcce4486a906e9b92abfca46b133c29753eeb4b80324309782a894bd24a5b2d7115d35c1668423a21d8a361b913442e8da8dbb678c2e33d5c9d83d43de0b6f7eaf075d24019aa3ac9f7f04d303693a07f5b4e44d2689ec31d2beab284264a3a9b835c9a3feeaf7b459f444eff650cb126a551464078e642e651727b057bec7646adeebd4ed08bc859267", 0xc3}, {&(0x7f00000004c0)="157379141db2bcd865b06c82601377033b22a0c7f4dff851e81a96a2b88b7479e29a2b429a854c4ba8bea9398eb871f1f1e81b9483b2c35d51b9e57b6eedc567fd389e5f04993ca9f644de4b891a43b9b10647c349b1d535f90538c01e6ca1bfeb51e813e80c541f9b9e3d197a5d9a59c1aa2b042732ff5412f2c8", 0x7b}, {&(0x7f0000000540)="6853cdfb3813920225224b4e60160b9aa27df38dbeda4a011e111e8227c2caea696fbe3394da0843bc71c9e3c9b6", 0x2e}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="564b72619364ae7cc1ed05972edf5459cf0ba0e2909db76f5ea0bb9b9e9b2f232730c4e10a72fbbc2d963c63815458382202c8ca555ba8871fbfbc53743e70d9d198c81db4aa48b64283e3f04e99c23b7a661ac11892100dc368ce8eca", 0x5d}, {&(0x7f0000001600)="9701c2983ad31b5cb1783001d5759ef8a94912ad34c43a823120118b9fa68bd01192fdb2325f8021f87fb47c", 0x2c}], 0x8, &(0x7f00000016c0)=[{0x10, 0x1}], 0x10}}], 0x1, 0x20000001) splice(r2, 0x0, r3, 0x0, 0x1420000a77, 0x0) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000080)={0xf802, 0xe75, 0x2, 0x4, 0x5}) r9 = socket$inet(0x10, 0x400000002, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000001780)={0x5, 0x2, 0x66b, 0x0, 0x7, 0x7}) sendmsg(r9, &(0x7f0000000380)={0x0, 0xcc865e67, &(0x7f0000000040)=[{&(0x7f0000000280)="24000000180007041dfffd946f610529802000001f040005000008000800070002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000000)=[{{0x2, 0x1, 0x1}, {0x1, 0x0, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x4, 0x0, 0x1}}, {{0x4, 0x0, 0x1, 0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x3, 0x1}, {0x4, 0x1}}, {{0x2, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x1}}], 0x28) geteuid() [ 274.109248][ T9244] MINIX-fs: mounting unchecked file system, running fsck is recommended 16:51:51 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20040843, &(0x7f0000000000)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000140)={r4}) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f00000001c0)={0x4, &(0x7f0000000180)=[0x1, 0x4, 0x120, 0x7]}) 16:51:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) accept(r2, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'bond_slave_1\x00', {0x1}, 0x81}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_open_procfs(0x0, 0x0) 16:51:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r2, 0x4080aebf, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00@']) ioctl$KVM_RUN(r2, 0xae80, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x800000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 16:51:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494fcbcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000009000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5fe6b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bd89e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb04e4cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e73872540", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(0xffffffffffffffff, 0x0, 0x0) [ 274.346899][ T9244] Process accounting resumed [ 274.383260][ T7099] minix_free_inode: bit 1 already cleared [ 274.459949][ T9272] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 274.603016][ T9280] overlayfs: conflicting lowerdir path [ 274.661242][ T9286] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 274.663469][ T26] audit: type=1800 audit(1589734311.958:30): pid=9283 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15853 res=0 [ 274.704761][ T9286] Process accounting resumed [ 274.713678][ T9286] minix_free_inode: bit 1 already cleared [ 274.723106][ T9280] overlayfs: workdir and upperdir must reside under the same mount 16:51:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2000) fsync(r0) unshare(0x40600) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x3, 0x5, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000e7ffffff851000000300000018100000", @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000095003f000000000000005300094d5e3690e9a652125c3512eda0ba6704cc8cda606cc86a07f964db1b8a9a3f39d206f4620cb4619b39124d883d35dfefbee97fc2a674f09682e07f13f3f4c81b34a7d24fc5d11f61cb2a00a19725dd"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:51:52 executing program 1: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyprintk\x00', 0x144502, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfffffdbb) r5 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$IPSET_CMD_SWAP(r5, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x6, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x800) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x7) read$usbfs(r1, &(0x7f00000002c0)=""/231, 0xe7) 16:51:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80040100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x60}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x5, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x60}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r4, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x69}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x27}}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x7, 0x4b, 0x8001]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_SECRETLEN={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0xc000}, 0x40040) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:52 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0xa30000, 0x7ff, 0x8, r0, 0x0, &(0x7f0000000340)={0x9a0905, 0x8, [], @p_u32=&(0x7f0000000300)=0x80}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='9p\x00', 0x40002, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}, {@version_u='version=9p2000.u'}, {@mmap='mmap'}], [{@seclabel='seclabel'}, {@uid_gt={'uid>', r3}}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r5}}, {@fsmagic={'fsmagic', 0x3d, 0x1ff}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2f}}, {@appraise='appraise'}]}}) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./bus\x00', 0x0, 0x0) linkat(r6, &(0x7f00000000c0)='\x00', r7, &(0x7f00000002c0)='./file1\x00', 0x1000) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdipperdir=./fiGML']) creat(0x0, 0x0) unlink(&(0x7f0000000080)='./bus/file1\x00') [ 275.405007][ T9261] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 16:51:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(0xffffffffffffffff, 0x0, 0x0) 16:51:52 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4a040, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) getdents64(r0, &(0x7f0000000540)=""/188, 0x724) getdents(r0, &(0x7f0000000140)=""/2, 0x450) 16:51:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x2, 0x280c40) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x0, 0x2d1264f8c2e7198, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000)=0x6, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x4, 0xedf, 0x20, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x990a7b, 0x5, [], @string=&(0x7f0000000080)=0xc0}}) ioctl$KVM_GET_MSRS(r4, 0xc008ae88, &(0x7f0000000140)={0x1, 0x0, [{}]}) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000000040)=0x7) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfffffd88) recvmmsg(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) [ 275.700737][ T26] audit: type=1800 audit(1589734312.998:31): pid=9349 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15833 res=0 16:51:53 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='loginuid\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0), 0x0, 0x10020, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="07f20d8f", 0x33) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0xffffff6c}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x2000}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 16:51:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) r1 = socket$inet6(0xa, 0x3, 0x3) clock_gettime(0x3, &(0x7f0000000000)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000080)=0x5, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x800, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x800, 0x0, 0x3, 0x2}, 0x20) 16:51:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000440)={0xff, 0x2, 0x200}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r3, 0x4080aebf, &(0x7f0000000000)) r4 = dup(r3) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000)={0x6, 0x0, 0x3, 0xfd}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="bec011907b1e80b8d60d528fa417cbdbbc9c5560d0255372ac830e3139ef65c731dd05850fff3ddabfc9d3f041c7e6471e3889310e54112623f93964779c0f87bb19dedcfd7a5002ea1ead532d4ef8f844a5d9f70583deb472614789f2bf0643921ce5979d29e21547bf6d926e0e3ff744adc87d1fec95bbeb12073dbe8e4be7853b4e8a5b78231135a56d9322007a4751c25367a024cf8498c6fa06a4f460e54961f26655d83599ea581ed8324d26630c4976fb36c0773b50cdbffd81c48a6fa3401d86348091e885a0362fb8fcc0c665b75e0d9cd112b889bab1c37ff8d268bdf7e624771ceb679c8af20536a994c1a7f454538098b8ebf5e11bcd0d8f187b1c87643f54adc81ee23dbe02624ee0e08757711df7fd365650382a7f63060be818b64d5731bab61e957beaed198a469d48ef232dd9233a336818afc26dd485d28467a5de65c840e7aa21a8c7919ba2fa64655d69fc8ba5fc87d3a6681fae02ddd2352032178a7cd84c0d80a36cd612a4efa7e085fd"], 0x34}}, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000000140)=""/181) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x38, r7, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x1c, 0x0, @l2={'eth', 0x3a, 'netdevsim0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r7, 0x800, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0x19, 0x59fb, @udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000001}, 0x80) [ 275.782376][ T9349] MINIX-fs: mounting unchecked file system, running fsck is recommended 16:51:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) [ 275.867445][ T9349] Process accounting resumed [ 275.898117][ T7099] minix_free_inode: bit 1 already cleared 16:51:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000005f00)=ANY=[@ANYBLOB="50010000100013070000000000000000fd554a1a3bf07d0b1d37251159d3ccdbff01000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8800000000000000000000000000010000000032000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000200040000000000000000006000020063626328646573335f65646529000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0000000"], 0x150}}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r0, &(0x7f0000000180), 0xf1, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFQNL_MSG_CONFIG(r1, 0x0, 0x0) 16:51:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) splice(r4, 0x0, r5, 0x0, 0x1420000a77, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x859) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) r7 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r7, 0x103, 0x6, &(0x7f0000000000)=0xbe8, 0x4) bind$inet(r6, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r6, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x9) sendto$inet(r6, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) [ 276.092584][ T9371] tipc: Started in network mode [ 276.100058][ T9371] tipc: Own node identity 3e28b0efd51f, cluster identity 4711 [ 276.134726][ T9371] tipc: Enabled bearer , priority 28 [ 276.155544][ T26] audit: type=1800 audit(1589734313.458:32): pid=9381 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15859 res=0 [ 276.195357][ T9381] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 276.256843][ T9381] Process accounting resumed [ 276.287640][ T9381] minix_free_inode: bit 1 already cleared 16:51:53 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'veth1_virt_wifi\x00', {0x2, 0x4e24, @broadcast}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x1f, @mcast1, 0x76d0}}, 0x7fffffff, 0x7ff, 0x7, 0x81, 0x8}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000180)={r4, 0x6, 0xff}, 0x8) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x105042, 0x0) sendfile(r5, r1, 0x0, 0x80005) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r7 = socket$nl_route(0x10, 0x3, 0x0) splice(r6, 0x0, r7, 0x0, 0x1420000a77, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, &(0x7f0000000200)) [ 277.254116][ T3003] tipc: 32-bit node address hash set to efb037eb 16:51:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x41c1, 0x41030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x20007ffc) 16:51:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) 16:51:55 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r1, 0x0, 0x0) r2 = accept$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000740)=0x1c) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000780)={0x7, [0x4, 0x9, 0x101, 0x100, 0x4, 0x8001, 0x7]}, &(0x7f00000007c0)=0x12) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000640)=""/246) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x4004743d, &(0x7f0000001080)=""/246) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup2(r5, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000000)={0x1b3}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 16:51:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000080)={0x5, &(0x7f0000000480)=[{}, {@none}, {}, {@none}, {}]}) r3 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@tails_off='tails=off', 0x7}]}) 16:51:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5b]}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f00000000c0)=0x6b) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x401, 0x24021, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x2}, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:51:55 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'veth1_virt_wifi\x00', {0x2, 0x4e24, @broadcast}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x1f, @mcast1, 0x76d0}}, 0x7fffffff, 0x7ff, 0x7, 0x81, 0x8}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000180)={r4, 0x6, 0xff}, 0x8) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x105042, 0x0) sendfile(r5, r1, 0x0, 0x80005) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r7 = socket$nl_route(0x10, 0x3, 0x0) splice(r6, 0x0, r7, 0x0, 0x1420000a77, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, &(0x7f0000000200)) [ 278.473803][ T26] audit: type=1800 audit(1589734315.768:33): pid=9427 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15872 res=0 [ 278.526897][ T9426] REISERFS warning (device loop3): super-6506 reiserfs_getopt: bad value "off" for option "tails" [ 278.526897][ T9426] [ 278.554527][ T9436] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 278.595091][ T9427] Process accounting resumed [ 278.600467][ T9427] minix_free_inode: bit 1 already cleared 16:51:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x53, &(0x7f0000000100)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000140)=0x2c) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) accept$unix(r1, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0xb, &(0x7f0000001280)) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r1, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x4058010) 16:51:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) 16:51:56 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x58201) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000080)) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1400) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mISDNtimer\x00', 0x50000, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)) ioctl$USBDEVFS_IOCTL(r1, 0x8108551b, &(0x7f0000000380)) 16:51:56 executing program 3: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendfile(r3, r0, 0x0, 0x6027) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r1, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x932, 0x0) 16:51:56 executing program 4: r0 = socket$kcm(0xa, 0x7, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a77, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001200)={0x3f, 0x6, 0x0, 'queue0\x00', 0x5}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xfffffd88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x81, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="2b3077294f7842ab519c8ef2f1eb15807fd8d9f1cff9f190e6e041b15bfd964d5154a743ed549665a9e8018d5396cebde7cc708a9abe0a8c00149a41784c9593bcefa6ac8cb68e10ee6774bb39aa045310c2b8323a843c586618082a67e17c55375492540b2b9945a0d1ae6e27e1d165afba6edc30d5c92bced7569a735b122593a28351", 0x84}, {&(0x7f0000000480)="6f0a7b8ed80f9bdde245c6cdecdebfdeb01fc94da024f157ac760b109402c620225d64e9f5a9deea8d8209a6d2803a9377fd674039faf644b6696c7567095213ceeaf84e39a7fcd3106d632c3f24d7c1c0c0457fc833c052496759b289e4d75d097b487c6c70d2d4eb1f11560bd8b90c1a2a8535ff113c9b9f67abe9c5d3371a92040f0c6d1ec477b04a5756634717197914540a061f1173eb46f52f87462293867772ba818407bba7a5e553b8da0aac47eb0a113307b416bfa53e90b4643a52c6a54cad82ba2c3d02494b1c2510c6ad395af805f93075016087cd4668d6f7", 0xdf}], 0x2, &(0x7f0000000740)=[{0x98, 0x0, 0xf6fa, "9408ae4c506736fe85afa283e1e199bc6fc7bb8ad6fbc1ba50af63e58527fd5bfe917547a6cc861f3bd83625e231416c0a663c66132a490141baf2d2a595ad9576ee67ac459cf09a6c12d6078d49b1d214a5d86027ec78183cae66565645909b314a3168ff10c54436e02ba5dcbbaddbf6c293a6eebff8177ff5cd185b19807b2758f1897c"}, {0xe8, 0x116, 0x71b, "e3b73cc5a2c7e3aa0e0963d645ac1eede5568e39980e7b01e7a3edf1ae35042b29164a60a2a63b32f03e4d38d0317c4ccf72f394d1674b018383ab2faddd5c67cdb06932c0756b9e5371fed6e9ebf7e546f5803861be1562c88722c9a86ccee2d7f93897b2be80f4b7672e7c093ba0e735f4e5511f2c1da0ec25bc8361fc02239054763f5510723bb50e4a6506318051d0d930fd906860676e9ad2226e67cdf5a69f38964d46ddd12ff235489cd5d4276e55492780b2376212dda1ebfc73d482fe9eacdf32b815a12400a6add809779aeda889fdae1883"}, {0xa0, 0x10f, 0x20, "8a06611b213aa2d88b42e6335b1910db3a1ab2560bb760bebc9969312f6cb66ef5ce4bb288a8ba3fef0982b4b0aaf325a0f2e2ebba6bcfc9a8550de0de402ebee8ec21f3525ff01f366d1aa5d70015355cb7ad7ff53f0a69d36dd042b9e86fda9e7d963a831c1687bb3c1afb21de7dfac18924bc82b7cc8653e0ef0b0858323b7667e80537f64eff95832af0d59d"}, {0xa0, 0x112, 0x800, "3c4254fef59924e2d39057f2b2cb0831e3b72e61939ec15b7b2038e9ef68426b0062f6523161fd44f93e57a356018d9653a879dce9aab329ed67df56c3fae394ec3c0b26f305ecaa6193d11f82a55c75d36e963c4e4d0fc4b7e013fd22911bf57fd6feba2980c0239049c508a4c33726235e15e15860805cabf7c9b6b0903f38888323f58622b141a8fb08decb"}, {0x38, 0x10f, 0x58, "904324d904705708927af4e0d45145ce9e989562915d4f44cdd9f5bf248b01483b73cd87"}, {0x28, 0x110, 0x0, "3188d168b69464990aa6f842bf71c8be48b32b26d8"}], 0x320}, 0x20008000) ioctl$SNDRV_PCM_IOCTL_PAUSE(r4, 0x40044145, &(0x7f0000000000)=0x400) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r6, 0x0, 0x0) sendmsg$kcm(r6, &(0x7f0000001340)={&(0x7f0000000b00)=@caif=@dgm={0x25, 0x1, 0x8}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000b80)="77992bd7a3ac2f46d0224c7d0ec172f325b1ef9e0e7cfb7598d36aa86a4e16c36e8052e8d6de2c5d7e892d9c2d8d19e2766f01b9fb0a295c934434e36cb6b2273dab23c5668313e036cbf2edb26eddc27b48a5a91a9f5f24329ca7ba8554643a518a093a68792d9bfd5787c1c2eed7a11f45e2b7050c2ab64f8d397a3b03fcfde308e688220523a43bd5d0a31eecffe8f0f082195f8852872dccc9c4d92179c4d2690b604c2e4679fb106e95fb7c58071fdaa52131a43e0f8c7929054f", 0xbd}, {&(0x7f0000000c40)="755bae44528e65ab3d5f506d7e577ffd65a8b8bacae857c3b5ec6835467c3757db981a1aa46aa56664d028e37027df6a3edb8cd91567b72fed66a9ed3996c29a54e9018820af38b184e3", 0x4a}, {&(0x7f0000000cc0)="3e08ca304e2a1a73ef895a9316b1a31adbd9db441f80ea5efbcc1e349342c79a77e95b01b0123ba684e7481e935ca261c4c0bb3594254ccf465871383e97f3c3fb7c501b98cbd261e488e62c65b5bf54afff1a6c664e3f2346af5fefe360bc1b3676799c0622ebb0ce264b920034530f00f3ce253927e3dd71d19eb610437fcafae2b670352be99d12a313912740dd49acb207ae66465624d5c2796e890e8e946c251256eb3d250992a1cded696eeb40fea7d8", 0xb3}, {&(0x7f0000000d80)="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", 0xfe}, {&(0x7f0000000e80)="9e362d9f25752a31da17a0c61eb61504e3a042ac44b4dc510356211d2a649b69c2130b19b098f85dba0b86db6cbde6ccc32569c824a562e94c2fbb4b216f1cb721a40cd9065f59de77b30d64e845b21cdf726082cc28254619a48f581c5922e91e30578ba482f47e7317dafc451646eef9bf7736b20b2f568c6fef49efb068eca0eb07bd587169b53a34c5364a68a078eb932462697fe495b8068602b69eb86405cd5028a8", 0xa5}, {&(0x7f0000001180)="cd1905e9431560e25d08ebbe70ba1cfc9f5aa2e7444c466359883cefdc76202642f48dfb950c2a967db2244a383062fe27a0e318fe6373c26a467807a37addb7abb2cd3db72d665c75f696203f934369a24b41db949e9333a6a5e4e9d976d15fca5971437dbf4cd6", 0x68}, {&(0x7f0000000fc0)="bf9f5ac93931cee6c5004599f375b43ff9bd8833a64be50d9153564e397b66269c41f17542096c123542b2140ba2869fd7513334f755714212365f94254ac272fa43744b9add1e8ce0c1e71c28a83c29dbe4e228806a52c60c6b6316124ffc0c20e0e34f001c5e9215cab35019d0941754d5c237e54e052754055aa3c6807ee1f8", 0x81}, {&(0x7f0000001080)="c5ba7e4265c735a3d4c9e0e6238360c666d99bc732e04d2e8410541382afa85bbc4565b662756726c896dfcf8fb880ca53950db038358c838c04b2108675208976803a6268c2f88f078bf2b5fb409453a5ead56e804842b908600e0beb8a5809eef264a6b883279ce5eda04f", 0x6c}], 0x8, &(0x7f0000001380)=[{0x78, 0x100, 0x10000, "ee17436542dc91c33f6b326db817b29f69567f3cbca962143823ecf26987fa441922e3b13868226d056f254ee7bbe96f40042056e4c169789a628953130a909c7bb5ed96c717effce8de735c04335c776297706da625b27de5ab97d7ebffc9ebe86e"}, {0x140, 0x10d, 0x84, "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"}, {0x40, 0x101, 0x10000, "bff69171613f669ebf3278f7de3702f139a7d8f49843e5f030ca61b409e4a5f6c2667f11e51ec347bf404840"}], 0x1f8}, 0x45) sendmsg$kcm(r6, &(0x7f0000001940)={&(0x7f0000000f40)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e20, 0xea4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}}, 0x80, &(0x7f0000001880)=[{&(0x7f00000012c0)="9ca250e3baf3e4aef7474b57312afdf253b1e460c84f8f4c905aa9481128a0b3b5a32dab7ce8270f9353c9e6785d3e5c5cce1db0b500d7cb578b43fe377f22623d400d2f64e34ae4ddd72fe6204ccb019b77693f46e63cad4b0c55c54584", 0x5e}, {&(0x7f0000001580)="655403d224561fe9f6f37b2ee63382dc9cd0734ff838d093d05017c0a1bbacb53656d8b242dc5f601e3dd621655a7fd79c3762cba3", 0x35}, {&(0x7f00000015c0)="fb09691c34b1f20419b8c1093b3e5ba0e4dfb12b62166e190868ef1e2220a514a60aa9bc053b360f2d0bab56e4ba0228df89d924ff04703e6c19fb2dd698ecc805efe449d7108425835b5a7758996d2ff555a09a5f7bea0f0815903de779a9fb52c5dcb569b9b86ddac646c1afcb347f8c882d386095b5021e7d951140fc61db3b27fcea09512ebe69e7f0b3f23c0e07e784b38a8d8fe90ec7701fadeda8d10cbf122602f532e5aef65b", 0xaa}, {&(0x7f0000001680)="712cebb493edd99fdd4518fad6e1a9488c90ecffb8ae01a27e6f91b3f7708a969d2ff4428f07ab8b53eb162cb2d1fce63af38cd21f4ef9cdc83ce207aa4b5b7e6790c8cb790128", 0x47}, {&(0x7f0000001700)="ac3cfb6e6188bad213139a2041a80cd05f04403d14712a75dffda77d153e76a99845e565a9cbff394c74c7ef070713a67139ba55e257a6412f9b4d2e43b98f3bcd548b347858c532ae977962f0f4ff39ddbef6f5bc34ddbbe8239dd640df299288cf2360865c70606ea54ddc6c76f3121210e4fa65786a7e8efbee26868bc6dfc7e14e54a96ddbd50fd45377946aa54e4ca8a12484e1820b794bb743bd6c5e429a0e4cc141fabd43b203068881409d647d5fc2f9abebaf69651d", 0xba}, {&(0x7f00000017c0)="d172e5f6f77fd980dcde66a3028663399bfd7ae768de91d48df783d73857ead8ff94d2207514c0bf1ae22d8a9d8aa0304c3e098e43d72eb924f5ce4756b898ab382a240a00b85f4c3249be1b0bc9b081", 0x50}, {&(0x7f0000001840)="fab96c5f51ab6c98aa42f9bb6d0caaa848c9438624511f768235c2ec018db9ac0f", 0x21}], 0x7, &(0x7f0000001900)}, 0x8000) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x9}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="180000020000000000ea"], 0x18}, 0x240040a0) r7 = accept4$unix(r3, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e, 0x80800) sendmsg$unix(r7, &(0x7f0000000ac0)={&(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000580)="7314815d72aae11e478540041e34d472ff0c442418c8017ff7dc06065978f6ffeab28da21f36f296214788984d76d0a7d8ea27112883f8b760dbc6329ff41805b419efadc73a7d26bbebf82c140db0f1793eaea264790b0ee57fb70209f1435447f487968d60c6b544ca87dd7acfa380227ddd8269c96a37f69022a1921a24", 0x7f}, {&(0x7f0000000600)="4a2bec1d697615a6138bf8f34563380b6ba4c7889389c97451fe023cd664f92d66970afb3bd3e01702da547da09cd2febc358074263a9955c3f9d9e0dd1d1f1dd058f577354adcfb1aadc7705e5630224496f0431cdc9532c1a4f3aec47282a1900700c5b1f12a62591f94e2af2a02da8c4f83f249d140303ba641396b3edb2749d1aac0", 0x84}], 0x2, &(0x7f0000000ac0), 0x0, 0x10}, 0x4040050) [ 278.971031][ T26] audit: type=1800 audit(1589734316.268:34): pid=9468 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15807 res=0 [ 279.011951][ T9468] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 279.019250][ T9471] md: md0 stopped. 16:51:56 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfffffff9, 0x0, 0x0, 0x0}, 0x40) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0', [{0x20, '--:\'-7^\x88'}, {0x20, 'wlan0$'}, {0x20, 'nfs\x00'}, {0x20, 'eth0keyring'}, {}, {0x20, 'nfs\x00'}, {0x20, 'selfmime_type'}, {0x20, '*'}], 0xa, "e0a44d876cddb6318a8896d87b77c173b1dcb789cdd36253ec55b82fba0350150351e270b9f397b58a1750b7c95ec3cf0b1b76c234aa52a03b595fb52ecb6d17c967f1e4994689a40193da5483a5fc85c6064bb046af2e8a05e7570a2ba81f00803a26a68a4b245e44ca6967df2d70c0d7aea773ed8fbe060fce0713d7a2d4115a0d7c022c2e13864e60884157e0e70a61464db312d238207cd01cc7705b0bb063aebec1dd6e5b0cbfdf09b7559b4ea242d4f4e68abe57ec3cd1e5a8cb2b0b29b6834f96a8767c599f79f362fbc1c0f18d0e018f33caf74592cbcb52ca33"}, 0x120) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x9}, 0x2000020000d194, 0x87f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f0000000080)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x56}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000100)) [ 279.159254][ T9468] Process accounting resumed [ 279.164990][ T9468] minix_free_inode: bit 1 already cleared [ 279.197445][ T9472] hub 6-0:1.0: USB hub found 16:51:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000180)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100)=0x8, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="1fce8bd580ddaf0efe866e1a15bf788ba25b6affe185dc8af1df035636fe62b5137bb7e3d562f676c941e1b4b7f3642db840148a42547e4d595852ba1557dcc7ac595824e9ee8272a70e9d374ececaee35bb23c66d22ce9ab98eec34d4c5622663aabd19500380243ee37f092c18e461bd26b6cf0460e9ad9c04ecab7409a08faf060a893159bc412c58b104d8078acc4ccd8578c440fd2895e78192310261662fc9"], 0x14}}, 0x0) recvmmsg(r3, &(0x7f00000013c0), 0x4a5, 0x200002, &(0x7f0000000c40)={0x77359400}) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000104, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f0000000040)=0x6) socket$nl_generic(0x10, 0x3, 0x10) getpid() r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 279.222949][ T9472] hub 6-0:1.0: 1 port detected 16:51:56 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSWINSZ(r0, 0x560a, &(0x7f0000000040)={0x8, 0x0, 0x1, 0x4}) [ 279.249344][ T26] audit: type=1400 audit(1589734316.548:35): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=9487 comm="syz-executor.1" [ 279.271526][ T9488] NFS: Device name not specified 16:51:56 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7, 0x1b, 0x1}, 0x7) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x24000010) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x140f, 0x2, 0x70bd25, 0x25dfdbfd}, 0x10}, 0x1, 0x0, 0x0, 0x90}, 0x40881) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 16:51:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494fcbcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000009000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5fe6b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bd89e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb04e4cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e73872540", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) [ 279.313719][ T9488] NFS: Device name not specified [ 279.325034][ T26] audit: type=1400 audit(1589734316.618:36): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=9487 comm="syz-executor.1" 16:51:56 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x95, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400c00) 16:51:56 executing program 2: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x1fc}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r8, 0x4080aebf, &(0x7f0000000000)) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[@ANYRESHEX=r5, @ANYRES32, @ANYRESOCT=r9, @ANYRESHEX], 0xfffffd88) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f00000000c0)={0x4, 0x1, 0x4, 0x10000, 0x4, {0x77359400}, {0x0, 0xc, 0x0, 0x6, 0x2, 0x0, "7decbd2d"}, 0x5, 0x2, @fd=r3, 0x9, 0x0, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x4) [ 279.476191][ T26] audit: type=1800 audit(1589734316.778:37): pid=9512 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15871 res=0 [ 279.511101][ T9512] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 279.526074][ T9512] Process accounting resumed [ 279.531464][ T9512] minix_free_inode: bit 1 already cleared [ 279.551792][ T9520] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 16:51:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) [ 279.585717][ T9515] relay: one or more items not logged [item size (56) > sub-buffer size (9)] 16:51:56 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, &(0x7f0000000680)='&@[\x00') [ 279.701535][ T26] audit: type=1800 audit(1589734316.998:38): pid=9531 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15867 res=0 16:51:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) [ 279.751997][ T9531] Process accounting resumed [ 279.832706][ T26] audit: type=1800 audit(1589734317.128:39): pid=9538 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15883 res=0 16:51:57 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)=0xbd65) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa10000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3b}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100182e07"], 0x0, 0x1b}, 0x20) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:51:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) [ 279.888167][ T9538] Process accounting resumed [ 280.014118][ T26] audit: type=1800 audit(1589734317.308:40): pid=9551 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15882 res=0 16:51:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494fcbcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000009000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5fe6b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bd89e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb04e4cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e73872540", 0x30d, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) [ 280.164971][ T9551] Process accounting resumed 16:51:57 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f0000000280)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)="95ac4df48e3fe2503bdd57e75c5b9b78e435eb4286841c6b2d0ac132cc160f1285e90f458fea46294741c986bcc620a98fc8e56dbc722d2a3a8049d7e8398a8754c19be407e85b0964845ad446a9a3af46264cf3d606a4dc4361", 0x5a}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x120}, 0x20000040) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="24000000220007031dfffd946f69050002000000054300000000391e421bff030400ff7e280000001100ffd613ffd3475bb65f640000000000200000eaa47e23f7efbf5400000000000008e4", 0x4c}], 0x1}, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r8, 0xc0bc5310, &(0x7f0000000140)) 16:51:57 executing program 3: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf93a1a7511bf746bec66ba", 0xffffffffffffffa2, 0x4, 0x0, 0x27) 16:51:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000008010a010100"/20], 0x14}}, 0x0) 16:51:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f00000004c0)="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", 0x30d, 0x34f9}], 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) [ 280.295831][ T9561] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 280.318393][ T9560] Process accounting resumed 16:51:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010000104000000000020000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b00010067726574617000000c00028008000700ac1414aa"], 0x3c}}, 0x0) 16:51:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0xe40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(0x0, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffffff91}, 0x1c) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a77, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000040)={0x20, 0x4, [0x0]}) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfffffeff000) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0xff9c, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x64010100}}, 0x8, 0x8000}, &(0x7f0000000180)=0x90) dup3(r0, 0xffffffffffffffff, 0x0) 16:51:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0100000000000000240012000c000100627269646765000e140002000800070000000000c0002ff5921fa1a7ed889afaacb33bb476b1b04dca9a56f693ffd0235e0b905e1eae8f353530559f7193ee27f8bbaf501d613904adf7ad96970401eaa0f6344068c2fcf9b8509367e98b18d7bd367d994ffc95ad370f615a4e"], 0x44}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0x7}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0xd9d0}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) [ 280.513358][ T9571] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 280.562601][ T9579] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 16:51:57 executing program 5: dup(0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="f700001010001fff00000000000600a8f84272cbc17139161e3c1d2fb6c07407de83e999c9bfeedcbc67fdaa380ccf0754e2392dcda8eac07df73ae821a76572d22679ec570e85bb71edc08e9ff6fa303a7a9ba7d228516d950c9d30fb456778746be0c788710b1bc126c0171d10e759a517286c7fe0ef52b9d7d5bed1d8909f9901b6", @ANYRES32=0x0, @ANYBLOB="6f110200282006003c0012800e00010069703665727370616e0000002800028004001200060011004e23000005001600020000000600020000000000060018"], 0x74}}, 0x0) [ 280.656823][ T9579] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:51:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:51:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x15555555555555f8, &(0x7f0000000140)=[{&(0x7f0000000b40), 0x700}], 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x2000000088) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSTAT(r4, &(0x7f0000000200)=ANY=[@ANYRESHEX=r3, @ANYRES32=r5, @ANYRESOCT], 0x56) sendto$inet(r1, 0x0, 0x20, 0x0, &(0x7f0000000280), 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f0000000040)={@remote, @local, @local}, &(0x7f0000000080)=0xc) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xfffffffffffffffc) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000001c0)={0xa20000, 0x10000, 0xfb, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa10905, 0x7, [], @value64=0x81}}) [ 280.760069][ T7099] minix_free_inode: bit 1 already cleared [ 281.028604][ T9586] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 281.055594][ T9586] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:51:58 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x4}, 0x20, 0x0, 0x0, 0x4, 0x400000000}, 0x0, 0x7, 0xffffffffffffffff, 0x1) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000600)=ANY=[@ANYBLOB="3400000024000b0f0000000000000000000000007711ef075edf71ec2825e379c4204167d1ab31d261919a8c15ab7ef59af2211dca88", @ANYRES32=0x0, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='L\x00@\x00', @ANYRES16=r1, @ANYBLOB="000800000000fedbdf251200000008001400", @ANYRES32=0x0, @ANYBLOB="08000100000000000c004300a6020000080000000500e400000000001400118004000100040004000400020004000600"], 0x4c}, 0x1, 0x0, 0x0, 0x4080}, 0x4000000) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000280)={0x0, 0xa, 0x8ffb}, 0x8) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e20, 0x200, @local, 0x5}}, [0x800, 0xfff, 0x0, 0x0, 0x7120, 0x4, 0xffffffffffffffff, 0x10000, 0x2, 0x5, 0x0, 0x4, 0x0, 0x8, 0x7fb]}, &(0x7f00000004c0)=0x100) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) [ 281.113476][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 281.113490][ T26] audit: type=1800 audit(1589734318.408:43): pid=9609 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15882 res=0 16:51:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r6, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b40000000206030000000000000000000a0000050540050005000000200007800800094000000001060004404e2300000c00018008000140ffffffff050005000300000005000100070000000900020073797a300000000012000300686173683a5cc4f9f7706f727400000014000780080013400000000908000a40000010000900020073797a3100000000140007800800094000000008060005404e2100001400030068ffff000069702c706f72742c697000"], 0xb4}, 0x1, 0x0, 0x0, 0x8010}, 0x1) ioctl$KVM_GET_MSRS(r4, 0x4080aebf, &(0x7f0000000000)) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r8, 0x40286608, &(0x7f0000000200)={0x7ff, 0x0, 0x5, 0x3, 0xffff8001, 0x7}) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/67) syslog(0x9, &(0x7f00000000c0)=""/154, 0x9a) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="48000000020605000a00000000000000000000000900020073797a32000000000d000300686173683a6e657400000000050001000700000005000400000000000500050002"], 0x48}}, 0x0) 16:51:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:51:58 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x30}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r6, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r7 = gettid() ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f0000000080)=r7) clone3(&(0x7f00000014c0)={0xc23bc00, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100), {0x39}, &(0x7f0000000200)=""/4089, 0x1000, &(0x7f0000001200)=""/177, &(0x7f0000000180)=[r3, 0xffffffffffffffff, 0x0], 0x3}, 0xfffffffffffffeff) r8 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 16:51:58 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) io_uring_register$IORING_UNREGISTER_BUFFERS(r1, 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r2, 0x4080aebf, &(0x7f0000000380)=ANY=[@ANYBLOB="0f096e553ad366dcca883009e0bf02dfd8d09008eb5ac8bc34a6f6902b0846a44426aed398910a3b2cdd84d75d1887bc986a0a3c06d028109ed9e5e9fa99078ea02bc6032cebb6a5d3ebc17946b5b8292c0ffecf518b1f076b08e3b4b6ccd6abc7cc7562293d0aeecec6f2dc67113af4b8a76646fbb630b3568188db7a2327abb929d567189949c41ffd8d3c466425c45aecdfb77939009d95da8e436b"]) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000001, 0x2010, r4, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@ipv6_newaddr={0x2c, 0x14, 0x100, 0x70bd2b}, 0x4}}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$smc(&(0x7f0000000240)='SMC_PNETID\x00') setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x8, 0x2, 0x2000, 0x40}, 0x10) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000002"], 0x3}}, 0x0) sendfile(r6, r5, 0x0, 0x100100000000) 16:51:59 executing program 5: unshare(0x40000000) mmap(&(0x7f000032c000/0x2000)=nil, 0x2000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x402040, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0)='gtp\x00') r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x1) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r1, r2, 0x0, 0x8607) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x0, 0x6, 0x1]}, 0x5c) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r5, 0x4080aebf, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000030084f5fefde01fe2cd672484450cab680e4e89c5b2cd68df31a63f634aff21a21bed14b9160e430f423aaf00488d219d62bd499f7303b4278a2c75978776dca5abd1e2bf922454b2521df344044c1477665462234e4c75a9e57daa7150fcfa9d15fe576ca27990404f68461c50fff8a3d31b2a08e659abb1948a182a53e6855c1a1d32ea496201e756608402091b3bb6c0f0c5a1"]) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0xfffffff, 0x9, 0x1, r5, 0x0, &(0x7f0000000080)={0x990a62, 0xd5, [], @string=&(0x7f0000000000)=0x8}}) sendmsg$NFT_MSG_GETGEN(r6, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x10, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x7}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8004}, 0x4000000) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0xce1e, 0xfffffffd, @local, 0x916d}, {0xa, 0x4e23, 0x802, @empty, 0x7}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) [ 281.690165][ T26] audit: type=1800 audit(1589734318.988:44): pid=9630 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15882 res=0 16:51:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB="480000001000390400"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000002800128008000100736974001c00028008000100", @ANYRES32, @ANYBLOB="08000300e000000006000e00070000002d8af1"], 0x48}}, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x424202, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f00000001c0)=@buf={0x21, &(0x7f0000000100)="154c7be3cc318e0fe6d06a7c48e0b8203977012c19445c9700b94620dfb5ee3820"}) 16:51:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) [ 281.738723][ T9636] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 281.853458][ T9642] IPVS: ftp: loaded support on port[0] = 21 [ 281.906893][ T9643] BFS-fs: bfs_fill_super(): Last block not available on loop2: 30957 16:51:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) [ 282.032136][ T9659] BFS-fs: bfs_fill_super(): Last block not available on loop2: 30957 [ 282.078376][ T9642] IPVS: ftp: loaded support on port[0] = 21 16:51:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) 16:51:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf93a1a7511bf746bec66ba", 0x8204, 0x20c49a, 0x0, 0x27) 16:51:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x80f20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1a00, 0x401, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20040843, &(0x7f0000000000)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r5, 0x0, 0x0) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000140)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="010025bd7000fddbdffa8e47e71f62b53600020000000c000300010000000000000008000200010000000c00830001000000000000000c000300000000000000000077675c404eb3697799514e2b6b14fa0a34cbdb0eb95fa790867884ff293e5e354830131d12f78d5afb589d7054af6d81611a2fa2568d66b0ff94e367"], 0x48}, 0x1, 0x0, 0x0, 0x40804}, 0x4004084) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 16:51:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) 16:51:59 executing program 1: r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a100000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x7, 0xfa}, 'port1\x00', 0x42, 0x4, 0x80000001, 0x6, 0x0, 0x7, 0x9, 0x0, 0x4, 0x2}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4800, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) [ 282.467352][ T26] audit: type=1804 audit(1589734319.768:45): pid=9640 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir872208572/syzkaller.wKPqGA/23/cgroup.controllers" dev="sda1" ino=15883 res=1 16:51:59 executing program 4: getpid() r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000040)=""/25, 0x19, 0x2, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r4, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x670) 16:51:59 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0x100000001, 0x9}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ppoll(0x0, 0x0, 0x0, 0x0, 0xb2db1ba001000000) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0xa) 16:51:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r1, 0x0, 0x0) [ 282.701015][ T9720] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 282.971343][ T9735] loop1: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 282.971355][ T9735] loop1: partition table partially beyond EOD, truncated [ 283.120295][ T9735] loop1: p1 start 4106 is beyond EOD, truncated [ 283.143854][ T9735] loop1: p2 size 2 extends beyond EOD, truncated [ 283.152093][ T9735] loop1: p3 start 225 is beyond EOD, truncated [ 283.175976][ T9735] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 283.184418][ T9735] loop1: p5 start 4106 is beyond EOD, truncated [ 283.191114][ T9735] loop1: p6 start 4106 is beyond EOD, truncated [ 283.223775][ T9735] loop1: p7 start 4106 is beyond EOD, truncated [ 283.230058][ T9735] loop1: p8 start 4106 is beyond EOD, truncated [ 283.245121][ T9735] loop1: p9 start 4106 is beyond EOD, truncated [ 283.251726][ T9735] loop1: p10 start 4106 is beyond EOD, truncated [ 283.273827][ T9735] loop1: p11 start 4106 is beyond EOD, truncated [ 283.280322][ T9735] loop1: p12 start 4106 is beyond EOD, truncated [ 283.304189][ T9735] loop1: p13 start 4106 is beyond EOD, truncated [ 283.310548][ T9735] loop1: p14 start 4106 is beyond EOD, truncated [ 283.324413][ T9735] loop1: p15 start 4106 is beyond EOD, truncated [ 283.341283][ T9735] loop1: p16 start 4106 is beyond EOD, truncated [ 283.351225][ T9735] loop1: p17 start 4106 is beyond EOD, truncated [ 283.362277][ T9735] loop1: p18 start 4106 is beyond EOD, truncated [ 283.371123][ T9735] loop1: p19 start 4106 is beyond EOD, truncated [ 283.381546][ T9735] loop1: p20 start 4106 is beyond EOD, truncated [ 283.391641][ T9735] loop1: p21 start 4106 is beyond EOD, truncated [ 283.401540][ T9735] loop1: p22 start 4106 is beyond EOD, truncated [ 283.412365][ T9735] loop1: p23 start 4106 is beyond EOD, truncated [ 283.419186][ T9735] loop1: p24 start 4106 is beyond EOD, truncated [ 283.426084][ T9735] loop1: p25 start 4106 is beyond EOD, truncated [ 283.432564][ T9735] loop1: p26 start 4106 is beyond EOD, truncated [ 283.444003][ T9735] loop1: p27 start 4106 is beyond EOD, truncated [ 283.450402][ T9735] loop1: p28 start 4106 is beyond EOD, truncated [ 283.463821][ T9735] loop1: p29 start 4106 is beyond EOD, truncated [ 283.470410][ T9735] loop1: p30 start 4106 is beyond EOD, truncated [ 283.477329][ T9735] loop1: p31 start 4106 is beyond EOD, truncated [ 283.485599][ T9735] loop1: p32 start 4106 is beyond EOD, truncated [ 283.492103][ T9735] loop1: p33 start 4106 is beyond EOD, truncated [ 283.499382][ T9735] loop1: p34 start 4106 is beyond EOD, truncated [ 283.505845][ T9735] loop1: p35 start 4106 is beyond EOD, truncated [ 283.513172][ T9735] loop1: p36 start 4106 is beyond EOD, truncated [ 283.520781][ T9735] loop1: p37 start 4106 is beyond EOD, truncated [ 283.527240][ T9735] loop1: p38 start 4106 is beyond EOD, truncated [ 283.533905][ T9735] loop1: p39 start 4106 is beyond EOD, truncated [ 283.540381][ T9735] loop1: p40 start 4106 is beyond EOD, truncated [ 283.547722][ T9735] loop1: p41 start 4106 is beyond EOD, truncated [ 283.554532][ T9735] loop1: p42 start 4106 is beyond EOD, truncated [ 283.561390][ T9735] loop1: p43 start 4106 is beyond EOD, truncated [ 283.569462][ T9735] loop1: p44 start 4106 is beyond EOD, truncated [ 283.577296][ T9735] loop1: p45 start 4106 is beyond EOD, truncated [ 283.585224][ T9735] loop1: p46 start 4106 is beyond EOD, truncated [ 283.591938][ T9735] loop1: p47 start 4106 is beyond EOD, truncated [ 283.600415][ T9735] loop1: p48 start 4106 is beyond EOD, truncated [ 283.608453][ T9735] loop1: p49 start 4106 is beyond EOD, truncated [ 283.615974][ T9735] loop1: p50 start 4106 is beyond EOD, truncated [ 283.622738][ T9735] loop1: p51 start 4106 is beyond EOD, truncated [ 283.633631][ T9735] loop1: p52 start 4106 is beyond EOD, truncated [ 283.640514][ T9735] loop1: p53 start 4106 is beyond EOD, truncated [ 283.648318][ T9735] loop1: p54 start 4106 is beyond EOD, truncated [ 283.655869][ T9735] loop1: p55 start 4106 is beyond EOD, truncated [ 283.662569][ T9735] loop1: p56 start 4106 is beyond EOD, truncated [ 283.671317][ T9735] loop1: p57 start 4106 is beyond EOD, truncated [ 283.679000][ T9735] loop1: p58 start 4106 is beyond EOD, truncated [ 283.686440][ T9735] loop1: p59 start 4106 is beyond EOD, truncated [ 283.694203][ T9735] loop1: p60 start 4106 is beyond EOD, truncated [ 283.700881][ T9735] loop1: p61 start 4106 is beyond EOD, truncated [ 283.708539][ T9735] loop1: p62 start 4106 is beyond EOD, truncated [ 283.715853][ T9735] loop1: p63 start 4106 is beyond EOD, truncated [ 283.722183][ T9735] loop1: p64 start 4106 is beyond EOD, truncated [ 283.732814][ T9735] loop1: p65 start 4106 is beyond EOD, truncated [ 283.747507][ T9735] loop1: p66 start 4106 is beyond EOD, truncated [ 283.754673][ T9735] loop1: p67 start 4106 is beyond EOD, truncated [ 283.761108][ T9735] loop1: p68 start 4106 is beyond EOD, truncated [ 283.776292][ T9735] loop1: p69 start 4106 is beyond EOD, truncated [ 283.793466][ T9735] loop1: p70 start 4106 is beyond EOD, truncated [ 283.811262][ T9735] loop1: p71 start 4106 is beyond EOD, truncated [ 283.820934][ T9735] loop1: p72 start 4106 is beyond EOD, truncated [ 283.832739][ T9735] loop1: p73 start 4106 is beyond EOD, truncated [ 283.842314][ T9735] loop1: p74 start 4106 is beyond EOD, truncated [ 283.857053][ T9735] loop1: p75 start 4106 is beyond EOD, truncated [ 283.863414][ T9735] loop1: p76 start 4106 is beyond EOD, truncated [ 283.878079][ T9735] loop1: p77 start 4106 is beyond EOD, truncated [ 283.888848][ T9735] loop1: p78 start 4106 is beyond EOD, truncated [ 283.900708][ T9735] loop1: p79 start 4106 is beyond EOD, truncated [ 283.910528][ T9735] loop1: p80 start 4106 is beyond EOD, truncated [ 283.922328][ T9735] loop1: p81 start 4106 is beyond EOD, truncated [ 283.931890][ T9735] loop1: p82 start 4106 is beyond EOD, truncated [ 283.946948][ T9735] loop1: p83 start 4106 is beyond EOD, truncated [ 283.953320][ T9735] loop1: p84 start 4106 is beyond EOD, truncated [ 283.968541][ T9735] loop1: p85 start 4106 is beyond EOD, truncated [ 283.978029][ T9735] loop1: p86 start 4106 is beyond EOD, truncated [ 283.989789][ T9735] loop1: p87 start 4106 is beyond EOD, truncated [ 283.999362][ T9735] loop1: p88 start 4106 is beyond EOD, truncated [ 284.011301][ T9735] loop1: p89 start 4106 is beyond EOD, truncated [ 284.020780][ T9735] loop1: p90 start 4106 is beyond EOD, truncated [ 284.032804][ T9735] loop1: p91 start 4106 is beyond EOD, truncated [ 284.042374][ T9735] loop1: p92 start 4106 is beyond EOD, truncated [ 284.056514][ T9735] loop1: p93 start 4106 is beyond EOD, truncated [ 284.062858][ T9735] loop1: p94 start 4106 is beyond EOD, truncated [ 284.077993][ T9735] loop1: p95 start 4106 is beyond EOD, truncated [ 284.087782][ T9735] loop1: p96 start 4106 is beyond EOD, truncated [ 284.099720][ T9735] loop1: p97 start 4106 is beyond EOD, truncated [ 284.109249][ T9735] loop1: p98 start 4106 is beyond EOD, truncated [ 284.121232][ T9735] loop1: p99 start 4106 is beyond EOD, truncated [ 284.131848][ T9735] loop1: p100 start 4106 is beyond EOD, truncated [ 284.146237][ T9735] loop1: p101 start 4106 is beyond EOD, truncated [ 284.152670][ T9735] loop1: p102 start 4106 is beyond EOD, truncated [ 284.167321][ T9735] loop1: p103 start 4106 is beyond EOD, truncated [ 284.177124][ T9735] loop1: p104 start 4106 is beyond EOD, truncated [ 284.183555][ T9735] loop1: p105 start 4106 is beyond EOD, truncated [ 284.198469][ T9735] loop1: p106 start 4106 is beyond EOD, truncated [ 284.211177][ T9735] loop1: p107 start 4106 is beyond EOD, truncated [ 284.222987][ T9735] loop1: p108 start 4106 is beyond EOD, truncated [ 284.232390][ T9735] loop1: p109 start 4106 is beyond EOD, truncated [ 284.246721][ T9735] loop1: p110 start 4106 is beyond EOD, truncated [ 284.253238][ T9735] loop1: p111 start 4106 is beyond EOD, truncated [ 284.267700][ T9735] loop1: p112 start 4106 is beyond EOD, truncated [ 284.277566][ T9735] loop1: p113 start 4106 is beyond EOD, truncated [ 284.300505][ T9735] loop1: p114 start 4106 is beyond EOD, truncated [ 284.316079][ T9735] loop1: p115 start 4106 is beyond EOD, truncated [ 284.322518][ T9735] loop1: p116 start 4106 is beyond EOD, truncated [ 284.333731][ T9735] loop1: p117 start 4106 is beyond EOD, truncated [ 284.353691][ T9735] loop1: p118 start 4106 is beyond EOD, truncated [ 284.360130][ T9735] loop1: p119 start 4106 is beyond EOD, truncated [ 284.385573][ T9735] loop1: p120 start 4106 is beyond EOD, truncated [ 284.392156][ T9735] loop1: p121 start 4106 is beyond EOD, truncated [ 284.402247][ T9735] loop1: p122 start 4106 is beyond EOD, truncated [ 284.417309][ T9735] loop1: p123 start 4106 is beyond EOD, truncated [ 284.429789][ T9735] loop1: p124 start 4106 is beyond EOD, truncated [ 284.440081][ T9735] loop1: p125 start 4106 is beyond EOD, truncated [ 284.455077][ T9735] loop1: p126 start 4106 is beyond EOD, truncated [ 284.461837][ T9735] loop1: p127 start 4106 is beyond EOD, truncated [ 284.475923][ T9735] loop1: p128 start 4106 is beyond EOD, truncated [ 284.482460][ T9735] loop1: p129 start 4106 is beyond EOD, truncated [ 284.495371][ T9735] loop1: p130 start 4106 is beyond EOD, truncated [ 284.501925][ T9735] loop1: p131 start 4106 is beyond EOD, truncated [ 284.515463][ T9735] loop1: p132 start 4106 is beyond EOD, truncated [ 284.522000][ T9735] loop1: p133 start 4106 is beyond EOD, truncated [ 284.540469][ T9735] loop1: p134 start 4106 is beyond EOD, truncated [ 284.550578][ T9735] loop1: p135 start 4106 is beyond EOD, truncated [ 284.562799][ T9735] loop1: p136 start 4106 is beyond EOD, truncated [ 284.572629][ T9735] loop1: p137 start 4106 is beyond EOD, truncated [ 284.585333][ T9735] loop1: p138 start 4106 is beyond EOD, truncated [ 284.591871][ T9735] loop1: p139 start 4106 is beyond EOD, truncated [ 284.613697][ T9735] loop1: p140 start 4106 is beyond EOD, truncated [ 284.620133][ T9735] loop1: p141 start 4106 is beyond EOD, truncated [ 284.634627][ T9735] loop1: p142 start 4106 is beyond EOD, truncated [ 284.649895][ T9735] loop1: p143 start 4106 is beyond EOD, truncated [ 284.660575][ T9735] loop1: p144 start 4106 is beyond EOD, truncated [ 284.671697][ T9735] loop1: p145 start 4106 is beyond EOD, truncated [ 284.682920][ T9735] loop1: p146 start 4106 is beyond EOD, truncated [ 284.694749][ T9735] loop1: p147 start 4106 is beyond EOD, truncated [ 284.701331][ T9735] loop1: p148 start 4106 is beyond EOD, truncated [ 284.715477][ T9735] loop1: p149 start 4106 is beyond EOD, truncated [ 284.722038][ T9735] loop1: p150 start 4106 is beyond EOD, truncated [ 284.739004][ T9735] loop1: p151 start 4106 is beyond EOD, truncated [ 284.750453][ T9735] loop1: p152 start 4106 is beyond EOD, truncated [ 284.761495][ T9735] loop1: p153 start 4106 is beyond EOD, truncated [ 284.771251][ T9735] loop1: p154 start 4106 is beyond EOD, truncated [ 284.777897][ T9735] loop1: p155 start 4106 is beyond EOD, truncated [ 284.784676][ T9735] loop1: p156 start 4106 is beyond EOD, truncated [ 284.791193][ T9735] loop1: p157 start 4106 is beyond EOD, truncated [ 284.797899][ T9735] loop1: p158 start 4106 is beyond EOD, truncated [ 284.804449][ T9735] loop1: p159 start 4106 is beyond EOD, truncated [ 284.810871][ T9735] loop1: p160 start 4106 is beyond EOD, truncated [ 284.821875][ T9735] loop1: p161 start 4106 is beyond EOD, truncated [ 284.830356][ T9735] loop1: p162 start 4106 is beyond EOD, truncated [ 284.837251][ T9735] loop1: p163 start 4106 is beyond EOD, truncated [ 284.844034][ T9735] loop1: p164 start 4106 is beyond EOD, truncated [ 284.850567][ T9735] loop1: p165 start 4106 is beyond EOD, truncated [ 284.857471][ T9735] loop1: p166 start 4106 is beyond EOD, truncated [ 284.864137][ T9735] loop1: p167 start 4106 is beyond EOD, truncated [ 284.870691][ T9735] loop1: p168 start 4106 is beyond EOD, truncated [ 284.877427][ T9735] loop1: p169 start 4106 is beyond EOD, truncated [ 284.884102][ T9735] loop1: p170 start 4106 is beyond EOD, truncated [ 284.890617][ T9735] loop1: p171 start 4106 is beyond EOD, truncated [ 284.898009][ T9735] loop1: p172 start 4106 is beyond EOD, truncated [ 284.913684][ T9735] loop1: p173 start 4106 is beyond EOD, truncated [ 284.920115][ T9735] loop1: p174 start 4106 is beyond EOD, truncated [ 284.943668][ T9735] loop1: p175 start 4106 is beyond EOD, truncated [ 284.950112][ T9735] loop1: p176 start 4106 is beyond EOD, truncated [ 284.958081][ T9735] loop1: p177 start 4106 is beyond EOD, truncated [ 284.972864][ T9735] loop1: p178 start 4106 is beyond EOD, truncated [ 284.980304][ T9735] loop1: p179 start 4106 is beyond EOD, truncated [ 284.995183][ T9735] loop1: p180 start 4106 is beyond EOD, truncated [ 285.001704][ T9735] loop1: p181 start 4106 is beyond EOD, truncated [ 285.014411][ T9735] loop1: p182 start 4106 is beyond EOD, truncated [ 285.020829][ T9735] loop1: p183 start 4106 is beyond EOD, truncated [ 285.031160][ T9735] loop1: p184 start 4106 is beyond EOD, truncated [ 285.038656][ T9735] loop1: p185 start 4106 is beyond EOD, truncated [ 285.049371][ T9735] loop1: p186 start 4106 is beyond EOD, truncated [ 285.056910][ T9735] loop1: p187 start 4106 is beyond EOD, truncated [ 285.063335][ T9735] loop1: p188 start 4106 is beyond EOD, truncated [ 285.073760][ T9735] loop1: p189 start 4106 is beyond EOD, truncated [ 285.080169][ T9735] loop1: p190 start 4106 is beyond EOD, truncated [ 285.090350][ T9735] loop1: p191 start 4106 is beyond EOD, truncated [ 285.097917][ T9735] loop1: p192 start 4106 is beyond EOD, truncated [ 285.107961][ T9735] loop1: p193 start 4106 is beyond EOD, truncated [ 285.115812][ T9735] loop1: p194 start 4106 is beyond EOD, truncated [ 285.122218][ T9735] loop1: p195 start 4106 is beyond EOD, truncated [ 285.135376][ T9735] loop1: p196 start 4106 is beyond EOD, truncated [ 285.141982][ T9735] loop1: p197 start 4106 is beyond EOD, truncated [ 285.153358][ T9735] loop1: p198 start 4106 is beyond EOD, truncated [ 285.162326][ T9735] loop1: p199 start 4106 is beyond EOD, truncated [ 285.177263][ T9735] loop1: p200 start 4106 is beyond EOD, truncated [ 285.187162][ T9735] loop1: p201 start 4106 is beyond EOD, truncated [ 285.197090][ T9735] loop1: p202 start 4106 is beyond EOD, truncated [ 285.203515][ T9735] loop1: p203 start 4106 is beyond EOD, truncated [ 285.213400][ T9735] loop1: p204 start 4106 is beyond EOD, truncated 16:52:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa3720060032c886dd6000000000180600fe800000000000000000000000000000fe8000000000000000000000000000aa00004e26", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="60c20100167f0c002792ee2ddcc3299cb9f9c55bcc83fa49fe04f989"], 0x0) [ 285.222175][ T9735] loop1: p205 start 4106 is beyond EOD, truncated [ 285.231232][ T9735] loop1: p206 start 4106 is beyond EOD, truncated [ 285.240112][ T9735] loop1: p207 start 4106 is beyond EOD, truncated [ 285.252914][ T9735] loop1: p208 start 4106 is beyond EOD, truncated [ 285.262829][ T9735] loop1: p209 start 4106 is beyond EOD, truncated 16:52:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, 0x0) fcntl$setstatus(r0, 0x4, 0x6000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000180)={0x3, "732c82"}, 0x4) write$binfmt_elf64(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c4605600c060004000000000000010006005a0c000042030000000000004000000000000000750100000000000009000000020038000200040005003f0003000000ffffff7fffff000000000000060000000000000062890000000000006c0a00000000000007000000000000002000000000000000040000006ef00000070000000000000000000000000000000500000000000000250d00000000000001000000000000000200000000000000cf502fdd438493bb0fc09f3ef1adc39db1a14f379113b4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d8a5091d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"/2503], 0x9c7) io_setup(0x1ff, &(0x7f00000004c0)=0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000380)=0x1, &(0x7f00000003c0)=0x4) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x5160300, r5}) 16:52:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r1, 0x0, 0x0) 16:52:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r4) getgroups(0x1, &(0x7f0000001000)=[0xee01]) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140)=[{&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000180)=[{&(0x7f00000002c0)="076187f9fda84e5870780ffd525a789bdb408eded8d2efccf63a5dee48e22066210c27b6e302739cef9f7feab5477a4036f584762f4f7493da06a8a5a28b4c4932c250d598cb73a6ef47399a76165a4822942b07fa8b4e8fd6f57c34a05e6bb16b321532963c9201f6e8fe03eb99fbd1ae92a54b9a833afd34ea7cadf64fe5d12f436b420f797c88a01468cae366be096342bf7e1362d18784b6e9a79179e6750d991461fc4d494cddfd20818a8c27545620f3d1a9f34bd3fd03a26505ef9cd3c9a091df65be7c6ecfebd2c6cdb2586da62f1fe397e3c95cd6904691194b70823bac67d1dad023ca889111135f6fea", 0xef}, {&(0x7f0000000080)="29a31cae6b670690857dffd86489bfb7afd17ebeb0765deba610270536901ec59d7feff2837b820a50", 0x29}], 0x2, &(0x7f00000005c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, r2, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x130, 0x802}, {&(0x7f0000000700)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000780)="717dbb3054264672f8845deaf1753f6b86f9f0f9628749cdd5edd8d32a5f69e5ff4d58fba83f4a48c76d4ecb65ac94bed1f9765b3312ba4e0c05a404240c59d1a7f508b81be38cb8fbe10f44f00ac84a7798009ff1606a81a11198b3449389b58e8ffbf6b0aea3d089cf572b770fd4957dd6fc387fae807d8882ce6ef9354b52657ec018aa30ba3431c54f328dedeb1c8fe3a78107197ff150207931205dba23ee5549f998459a94b96b228e1e41857704b0665515261358adca6cf4764a5dfcd4ad0d080de82c7af96983b50df63bf3f76a3f48223e49fa673c", 0xda}, {&(0x7f0000000880)="884d3afbf60caae170f8a305f5abc1f011c9f0657fc02d3ab342477f9e2c234e6dc836ac1ed974500099d31052483a359021153f6df6043e5752d08cc281998bd1bb96e19159", 0x46}, {&(0x7f0000000900)="24572b392c161a56b1a0eee95cecef45f82f921681195b5574a9be213c3a31783baf1e316e3be6ac9ee3bcee74fb444b6487d2933c3eb45fa72ae931a62dd8ff9cc0fbba8bb9fb327d17f3117ea62555e4cf687dd890f29863cc23d781de8f2d70a2d4d6cbd7a28c4254c04e83fad331c3e8c7a8baca0b811f15e50b8ce3cd1cc5a08641385ccdd784ae62c2a1b97a81205852c4190e3afce01463636cf88b44900835125d584526f709855fac74740b3e134edc143256f55c52a8b1343c20d6003f47ba004132b088b73a456d0b59d3da4c83fe15", 0xd5}, {&(0x7f0000000a00)="bb2e0001f9d28140d4237d689ac3a88d6b8e483a093d1729771ad2d3739fce131557b8559940e5b750c077befe7cd93994ec9091f14b4029ce16ac838cdd0fce4aad88dc1565d25644a6f2a9fa3da9c77ba3488f209639e5e96c6adbdb2a1669861061771fc9218bbe5d0b2f7e2eb4f4ca2e24da2a09b421cc71add48db61865187d644c0d26e66f9eab3db6483e3d865635c59a32b4f04a7b7ca878daf0e3fc5ee949c9069ede5fe9becad7ecaad5d4cc96ade5aa7d43379e67b21ef47df0578d123e5eb851671e52a928a9ef901e0e925deb5f9beba60bc2198a", 0xdb}, {&(0x7f0000000b00)="8d91795c87457756a42e406fd99d0fa11f4112eb354f333b569fc8515fc1eb209eecd3770d833e0650f36893b7a58c3368b753c0de66560ef8949881edea5c110e06893f3b5542162543a47183568980950a070dc1f7", 0x56}, {&(0x7f0000000b80)="2eb1b7fd8b4f440526738fe29c3cd2bb38cdd30c58447deed9bfaf2c480a4f18149dc4451ecd49ab72fe28c222037096d3b8f9bfb31611bb377fc57d577c5e21745b4b1f8dc909ff6f8aacbf7d392aded979f8aad9eaa70cca050667c138fd6cde9f30c2bed0a493b230155701d5642d2cf999ae16b4c19c81e01ad8bec44b", 0x7f}, {&(0x7f0000000c00)="bc520716a1097cffb5c85412837ce0f79a213dd7efaf6d6f8124bc04dda64cedba26013ae12982dab5346c3e2b1816ad96f055db23e2d0e539aa0b404b886817081893681b223e56f7f7c23300571b3f4e92971eb9f8229b3639ae3db987714bba57d0b4c63049ccb6234a5ee252899ccd934a43a238050f0e9fe7cab7226456f24e9888df76f25db0bef534bd93806ef972fdcc81f58ddeadd44fa895a6968550d1217f7658aa07bfb1261a8b90ec371b2cdfe276d616004662cb5f1a9a0eed8bcc3352e525d18e371b179761157134d3091e0aa242935b1a3db1c97953adef257b37b7f97656", 0xe7}], 0x7, &(0x7f0000000d80)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x10}, {&(0x7f0000000dc0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000f80)=[{&(0x7f0000000e40)="4181e0743e131a0bd0922ccc2c6fe87d6766194a07f822221e01da91e636cc3cb84a8954e59c68930e0a76cae6cf867101c656aeb1ab0e1ececf1658c1cb10cc431e30a9c84d5098e871dfb580a59f658aceed035a80bf84a3dfa50990fe4c625bfb73db42ca6e9426d66b65bfa0f5a98d39aee5892b1636a13c3bd93b048e44c138ea6ac30806e49f9b6c1fa9b9c8eb8ed94ffe37a4", 0x96}, {&(0x7f0000000f00)="0e7ca46b9b", 0x5}, {&(0x7f0000000440)="96c946d25252401c20bfecf2bf5e3473bf8fd530397aa37d7507fb4920e52e8b20de15dcf658cf4bf2a17206dd8778c7e2071593a345e257945b220157b382ec435c70418544b4538588239ad5f10fbc5070e39e4b8dba6f3cdc0894fc9425343053c4c121a3c4d04657ec506fa455e1d8048e1a2174f994c4e9ffff9392218d4d39caa71c4fb74902018a259aaa6a0764", 0x91}], 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32, @ANYRESHEX=r3, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000000000100000001000000000000000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="02000000fab0888f7aee6e750100000002000000", @ANYRES32=0x0, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00'], 0xc8, 0x20040050}], 0x3, 0x40080c0) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r6, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11b000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000100)="66baf80cb876621589ef66bafc0c66b821f466ef652ef30fc7751a660f00dc6565660fc7b7001800000f01c5b8000000000f23d80f21f835000000500f23f80fc76f8166b8c9008ec0f30f080f0f1d0a0000001d", 0x54}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000040)) 16:52:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000040)="d353ff022d68b2e4dc14aa5f7e25908384") [ 285.272519][ T9735] loop1: p210 start 4106 is beyond EOD, truncated [ 285.280409][ T9735] loop1: p211 start 4106 is beyond EOD, truncated [ 285.304824][ T9735] loop1: p212 start 4106 is beyond EOD, truncated [ 285.328424][ T9735] loop1: p213 start 4106 is beyond EOD, truncated [ 285.364978][ T9735] loop1: p214 start 4106 is beyond EOD, truncated 16:52:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r1, 0x0, 0x0) [ 285.397169][ T9735] loop1: p215 start 4106 is beyond EOD, truncated 16:52:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002042100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x9c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000766c616e300000000000000000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b808000030090000616d6f6e6700000000000000000000000000000000000000000000000000000018040000000000000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000054000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000027327243426c7d2d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a2a861610000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c770000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff00000000"]}, 0xa38) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) splice(r5, 0x0, r6, 0x0, 0x1420000a77, 0x0) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x440, 0x0) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f0000000000)='broute\x00', &(0x7f0000000040)='./file0\x00', r7) [ 285.438133][ T9735] loop1: p216 start 4106 is beyond EOD, truncated [ 285.454099][ T280] tipc: TX() has been purged, node left! [ 285.454815][ T9735] loop1: p217 start 4106 is beyond EOD, truncated [ 285.472641][ T9735] loop1: p218 start 4106 is beyond EOD, truncated [ 285.497409][ T9735] loop1: p219 start 4106 is beyond EOD, truncated [ 285.560349][ T9735] loop1: p220 start 4106 is beyond EOD, truncated [ 285.590344][ T9735] loop1: p221 start 4106 is beyond EOD, truncated 16:52:02 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) [ 285.618252][ T9735] loop1: p222 start 4106 is beyond EOD, truncated [ 285.627401][ T9785] ebt_among: dst integrity fail: 155 [ 285.653624][ T9735] loop1: p223 start 4106 is beyond EOD, truncated [ 285.660162][ T9735] loop1: p224 start 4106 is beyond EOD, truncated [ 285.689586][ T9735] loop1: p225 start 4106 is beyond EOD, truncated [ 285.698712][ T9735] loop1: p226 start 4106 is beyond EOD, truncated [ 285.709970][ T9735] loop1: p227 start 4106 is beyond EOD, truncated [ 285.718796][ T9735] loop1: p228 start 4106 is beyond EOD, truncated [ 285.732829][ T9735] loop1: p229 start 4106 is beyond EOD, truncated [ 285.747007][ T9735] loop1: p230 start 4106 is beyond EOD, truncated [ 285.759660][ T9735] loop1: p231 start 4106 is beyond EOD, truncated [ 285.767687][ T9735] loop1: p232 start 4106 is beyond EOD, truncated [ 285.778499][ T9735] loop1: p233 start 4106 is beyond EOD, truncated [ 285.785308][ T9735] loop1: p234 start 4106 is beyond EOD, truncated [ 285.791855][ T9735] loop1: p235 start 4106 is beyond EOD, truncated [ 285.798612][ T9735] loop1: p236 start 4106 is beyond EOD, truncated [ 285.805703][ T9735] loop1: p237 start 4106 is beyond EOD, truncated [ 285.812255][ T9735] loop1: p238 start 4106 is beyond EOD, truncated [ 285.820725][ T9735] loop1: p239 start 4106 is beyond EOD, truncated [ 285.827230][ T9735] loop1: p240 start 4106 is beyond EOD, truncated [ 285.834871][ T9735] loop1: p241 start 4106 is beyond EOD, truncated [ 285.841370][ T9735] loop1: p242 start 4106 is beyond EOD, truncated [ 285.848005][ T9735] loop1: p243 start 4106 is beyond EOD, truncated [ 285.854783][ T9735] loop1: p244 start 4106 is beyond EOD, truncated [ 285.861306][ T9735] loop1: p245 start 4106 is beyond EOD, truncated [ 285.867822][ T9735] loop1: p246 start 4106 is beyond EOD, truncated [ 285.874329][ T9735] loop1: p247 start 4106 is beyond EOD, truncated [ 285.880751][ T9735] loop1: p248 start 4106 is beyond EOD, truncated [ 285.887411][ T9735] loop1: p249 start 4106 is beyond EOD, truncated [ 285.894237][ T9735] loop1: p250 start 4106 is beyond EOD, truncated [ 285.900654][ T9735] loop1: p251 start 4106 is beyond EOD, truncated [ 285.907180][ T9735] loop1: p252 start 4106 is beyond EOD, truncated [ 285.914491][ T9735] loop1: p253 start 4106 is beyond EOD, truncated [ 285.921023][ T9735] loop1: p254 start 4106 is beyond EOD, truncated [ 285.929641][ T9735] loop1: p255 start 4106 is beyond EOD, truncated 16:52:03 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800000024000b0500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000b000100636c73616374000008000d0000800000"], 0x38}}, 0x0) 16:52:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES64, @ANYRES32=r2, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x4000004) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r9, @ANYBLOB="0100000000000000240012000c000100627269646765000e140002000800070000000000080027"], 0x44}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0x7}]}}}]}, 0x3c}}, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000000c0)={0xa, 0x4e22, 0x9, @private1}, 0x1c, &(0x7f0000000940)=[{&(0x7f0000000240)="8a6956a11721720043ae8fac65971f5c911e0284de1a01f9308540407100ba99e1165bfa355aede9b30d203b5fe9b782b9f96bbca2d9e2131a94d16e1527613d0b918cb6e7d07e9211cd", 0x4a}, {&(0x7f00000003c0)="c47dcf12991929adc89efd694e4d0a664e2ea9096f47c63c5e67921fab3a739ea3ca047d005d339e3549d0ea073d865226f22814df8bc39618e57c57468c27500d583ae2309f571b88e610f6b92aed33823f71344f1986c3ccc437e8210278b70fca10c4d3674630d2a0ab2817aa932c042617a4858e3323eacc0292ad", 0x7d}, {&(0x7f0000000440)="24cc74dbfee88ba47869c14d2f2c79f07403a4fe7860a5b70cf3ec7df7eb298800a32254f2085bcbca090ae39c9da9b8a95ff4730ab45c1d2b3226d7994523", 0x3f}, {&(0x7f0000000480)="635cfc1038ae843fea98702dcebe35de0d18c9348fe283ba746a3b402e0b1463e5f2e04678054178a6ce0df51ae510e79a9b69a32aa592033b1bc1cd406067a0b2af9c7136ca7bcdf3767601fc0805e2d0ee01126fb7a8cbe1c15a0ddeb73cbbe9dff25f337fa14188e5f839aab26959b177c89e8e8310aae31c20ea2b9a1ccc78d681b277d1e2e3363c3112d5f35eb2b9b2c16c7558ede698345fd58dcbaed072d47a92add1b7b6d85afda244bad6200d5627180f6eac3a3a25e284da44c6d75f406735ef46efcd29afaa7875791cada0", 0xd1}, {&(0x7f0000000580)="f7782671357d68f73ad85a4c3af94b7b9d05e2606f646408a986b3af5c860d7151724b74bddd3b22d8d6e27cb6f94dd831ba14f9734afbdd24adb033fcd8ca2ac1f4b46c1803eb6b0fceaf16c59a3cc77759afc0fcf5251554fac5f10dd41c0b75fcefe3319fd4bcbd374ed0729048cf4fcb7ed566703cd88f2b48b12b1c063e89573d7c10a205226693276174eef1", 0x8f}, {&(0x7f0000000640)="b8a1fb66019a7ede71d69dff3aec948d6c8af5960633999469eb13aae28440676524c577ee8fff53fb5ad80962379a475075f503a40b9099712dc453cceb193df7eb50e7816a3cdcf958dae21b40ce0b384ad683957041e885da9d0db35bb745b77d24416369d70136eeec3ecc2acb082b6c246f3cd1c883d25690d0bcd9aa805e3668efa7562bbd18", 0x89}, {&(0x7f0000000700)="12d13e6aca1a499167ddbfb850c4732fed54a12413f69dd487ce4edcfdfa213c8781fb1c86178c204d141c487a240ffac055ce395e76b94730655b84d254153dfae27e834c9c3df3e04e9d559de845ffdc78d64005f9c6cd3c7d74669642437c45a4ed7bfea4ad00b55f94fafdab0e272d3fec0d97271581cfd3e19c72357a3e23806974442d0b37a630", 0x8a}, {&(0x7f00000007c0)="57c97d45b3f2d5061359028b2019a97b04867c4d0c29d26aa13f87442eef66f4ae0a757b9802151544eb6b05a013957c411cc6663ba2c208d8acaaf55f217998e237", 0x42}, {&(0x7f00000008c0)="bf704cc130cebd3f22aa41365165ac41dec7f09a99452b8f04f4ceaec46ef143fcaeec62a8568211c526358b09513d31329866f76ac8c43521da8d8aa0fb1cbfa2f621a2744634ac9796d85d1a9b48", 0x4f}], 0x9, &(0x7f0000000a00)=[@tclass={{0x14, 0x29, 0x43, 0x7}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x64205b5f}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0xff, 0x1, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @pad1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@local, r9}}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x3a, 0x1, [], [@enc_lim={0x4, 0x1, 0x7}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x0, [], [@pad1]}}}, @dstopts_2292={{0x140, 0x29, 0x4, {0x0, 0x24, [], [@hao={0xc9, 0x10, @private0={0xfc, 0x0, [], 0x1}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x0, 0x4, [0xfffffffffffff208, 0x2, 0x2, 0x9]}}, @jumbo={0xc2, 0x4, 0x5}, @hao={0xc9, 0x10, @private1={0xfc, 0x1, [], 0x1}}, @jumbo={0xc2, 0x4, 0x5}, @ra, @enc_lim, @generic={0x1, 0xbc, "ba5d2fb546adee5d59a6e21249d935fb6d51ff51620771a0f3a0b16602406e57cd158a6a25ff98e3d7d0ac8fe4160b789b7b5db3ee53b77d5e8642980db24f289a71560d07852d8bf9bf010f9538056fcfba69e732d2c3bd630b4025b63f9e16ef97cd27051763d874200e206b31bb276c1bc8f8cd8ae76bffac9882bab5873a891c85bfb2037586156bcfbbd778acca9e12f4fa999d35f8046a3925f4f545ed5146ea55215ba6bbc773a7a1ec5de7f8df8ec742300bd2afbca38794"}, @enc_lim={0x4, 0x1, 0x1}]}}}], 0x218}, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x1, 'xfrm0\x00', {}, 0x4}) 16:52:03 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) 16:52:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400001}, 0xc, 0x0}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x0, 0x400000000007}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x375) pipe2(&(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000002f000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:52:03 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) bind$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x3, {0x41, 0x3, 0x1}}, 0x10) 16:52:03 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) [ 286.274656][ T9810] netlink: 'syz-executor.2': attribute type 7 has an invalid length. [ 286.311602][ T9810] netlink: 'syz-executor.2': attribute type 39 has an invalid length. 16:52:03 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x20003000) openat$zero(0xffffffffffffff9c, 0x0, 0x640081, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x54) 16:52:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r2, &(0x7f0000000180)={@void, @val={0x5, 0x0, 0x0, 0x0, 0x7e}, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x84, 0x0, @remote, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "001500", 0x1, '\a\x00`'}, "ccbfc12abc282c27820fd9118600820e000500110000000094ce7f17e89fb5f1112b33df4c366b67856c210a24c3df6373d0ca47aac2885da778edbd1ee5bde967a600ca0e2ba1e34aebb68aa9431063000000000000000000010000"}}}}, 0x8a) 16:52:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) [ 286.437067][ T9826] IPVS: ftp: loaded support on port[0] = 21 16:52:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x201, 0x0) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000080)={0x4, 0x100, 0x1, 'queue1\x00', 0x3}) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) sendmmsg(r2, &(0x7f0000007fc0), 0x80003e8, 0x0) [ 286.765524][ T9816] netlink: 'syz-executor.2': attribute type 7 has an invalid length. 16:52:04 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x4}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x28, 0x17, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}}]}, 0x160}}, 0x0) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) pidfd_send_signal(r1, 0x32, &(0x7f0000000000)={0x35, 0x800, 0x3}, 0x0) 16:52:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) 16:52:04 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(r1, 0x7fffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() pipe(&(0x7f0000000280)={0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) splice(r3, 0x0, r4, 0x0, 0x1420000a77, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000100)="740bda9440363e820900893b3d28fb1fadb65253110fe1f4b77cba56c2ef80825f8373bc0da28a137ea21fe31970f6e7d6731422835e07dcbc4ca42e48f017e41cb8eb7cde95084eef8f4e1e7be18d89656363e338d4de3a5b459e01f97cb5f369a73aba3ecb3d9beabee233f2daf9ea22153e93698eca4dc4d56b2427d52a1ec376aca7beb3f44b57162c431891d13c58882fa2398a128d6920d1c9ba9a8717f010954f0a05841ea6a16c5d260690a07937bbd6b058c4df71033b3746b7fc398b1e506314d1878e0db4e4aa63b74e3127417e2e24661205aee2"}, 0x20) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="45e9aed1b0fe131d343a0bfd0000000025d86800278dcff466010000805acf4f9836460234432479aed75d492b415b0500000000000000adaf81dcfcfef66503fea62d2b2e7807ddce1c0dfa00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823afcc8e81e5af9a54ce4d100009cfc3567f26ce6d65c7859765ca2f8fe77ab8d3f327f145464fc3ac1b3eb71dbeffc8ea8c9e59e011230e27127342b195e0da8310fd9765829b92da4c89a697dd072639fe64d70dbc390547b6e5235798fa8ec8a02458f9cb3332233b72872154767d29bff76f3a2a215ee231874bbaa7d", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 16:52:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) [ 287.232397][ T9828] IPVS: ftp: loaded support on port[0] = 21 16:52:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) 16:52:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) 16:52:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x201, 0x0) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000080)={0x4, 0x100, 0x1, 'queue1\x00', 0x3}) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) sendmmsg(r2, &(0x7f0000007fc0), 0x80003e8, 0x0) 16:52:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) 16:52:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="44000b001000010400"/20, @ANYRES32=0x0, @ANYBLOB="03ea000000000000140012800c0001006d616376746170000400028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB], 0x44}}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 16:52:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000002400000024000000020000000000000000000083"], &(0x7f0000000280)=""/245, 0x3e, 0xf5, 0x8}, 0x20) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r4, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000050}, 0xc4000) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(echainiv(aegis128-aesni),hmac(blake2s-160-x86))\x00'}, 0x58) r5 = accept(r0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)={0x1c, r7, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x13018a18}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x68, r7, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x1c, 0x49, [0x147201, 0xfac0c, 0xfac08, 0x147201, 0xfac01, 0x0]}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac09}, @NL80211_ATTR_SSID={0x8, 0x34, "0e31ad88"}, @NL80211_ATTR_AKM_SUITES={0x14, 0x4c, [0xfac0f, 0xfac09, 0xfac0c, 0xfac08]}, @NL80211_ATTR_PROBE_RESP={0x13, 0x91, "861030a3bfc959713ac9a315f31f09"}]}, 0x68}, 0x1, 0x0, 0x0, 0x40800}, 0x48804) sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r5, 0x0, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x65, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:52:09 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xffffffff, 0x0, 0x2ab2, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) shmdt(0x0) exit(0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f00000004c0)={0x7}) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x1, @raw_data="0a4ff61e35428ccd343232505efb2a3064856ad9056d9ac6bc0bcd980ce99f039c00761ab371a71d9e5ed44f80006291eb454d6d720d74b812c2e05f668f8fd92b04602292c3e4f50e3b0b4bbb0daaff7cc809d03492133a77bf49f2497cb8410f316291518ddc3329acf406b7a8596f5adb89c4e8c024f3557b03f683b3e28eee6c20cf8a3a00e80b7f946df70ffef192eb0b8e9dedef706a02b1f2bac8378311eeb109306c279ac1bff9d74c7efd17fa003d166861a073e1881831d9580a7b66077aad5eff6b05"}) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000003c0)=0xff, 0x4) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x4a6980, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000300)={0x9e0000, 0x0, 0x3e, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x990a72, 0x3f, [], @string=&(0x7f0000000280)=0x6}}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="640000000301050000000086573677000c00000180050003000500000005000100fa000000060004008000000005000300010000000600050007070000050002008100000005000200000000000600040081030000"], 0x64}, 0x1, 0x0, 0x0, 0x8000}, 0x4040) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, &(0x7f0000000240)={0x32, @multicast1, 0x4e20, 0x2, 'lc\x00', 0x8, 0x0, 0x5a}, 0x2c) syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') syz_open_dev$vbi(&(0x7f0000000480)='/dev/vbi#\x00', 0x3, 0x2) [ 291.910411][ T9935] BPF:[1] ARRAY (anon) [ 291.931693][ T9935] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 291.949618][ T9937] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 291.959108][ T9935] BPF: [ 291.972375][ T9935] BPF:Invalid btf_info kind_flag 16:52:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) [ 291.989458][ T9935] BPF: [ 291.989458][ T9935] [ 292.053105][ T9950] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 16:52:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sched_setscheduler(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={0x0, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x804) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0xe1) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) ioctl$GIO_UNIMAP(r4, 0x4b66, 0x0) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') 16:52:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) 16:52:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x201, 0x0) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000080)={0x4, 0x100, 0x1, 'queue1\x00', 0x3}) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) sendmmsg(r2, &(0x7f0000007fc0), 0x80003e8, 0x0) [ 292.223531][ T9939] Only authenc() type AEADs are supported by ESSIV [ 292.231136][ T9935] BPF:[1] ARRAY (anon) [ 292.237058][ T9935] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 292.263094][ T9935] BPF: 16:52:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x4000, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r4, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b2ab804b38f9cac8fea1a8c4712b53306c00a649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f86005f85f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x3, &(0x7f00000033c0)=ANY=[@ANYBLOB="1802000000000000000000000000000095"], &(0x7f0000000580)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5, r6}, 0x78) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xffffffffffff99aa, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x15, 0x4, &(0x7f00000000c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xc95}, @ldst={0x2, 0x1, 0x6, 0x7, 0xb, 0x1, 0x4}, @generic={0x7, 0x6, 0x1, 0x3, 0xc18}], &(0x7f0000000100)='syzkaller\x00', 0xffffff86, 0xf9, &(0x7f0000000300)=""/249, 0x41000, 0x1, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000140)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0xe, 0x6, 0x98d}, 0x10, r5, r7}, 0x78) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002a000000e8bd6efb250314000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) [ 292.272489][ T9935] BPF:Invalid btf_info kind_flag [ 292.301590][ T9935] BPF: [ 292.301590][ T9935] 16:52:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) 16:52:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x6}, 0x100, 0x2000000000, 0xfffffffe}, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) splice(r3, 0x0, r4, 0x0, 0x1420000a77, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'team_slave_1\x00', 0x1000}) splice(r2, 0x0, r0, 0x0, 0x10000, 0x0) lseek(r2, 0x5, 0x4) 16:52:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x201, 0x0) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000080)={0x4, 0x100, 0x1, 'queue1\x00', 0x3}) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) sendmmsg(r2, &(0x7f0000007fc0), 0x80003e8, 0x0) [ 292.482262][ T9971] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 292.516755][ T9971] device batadv_slave_0 entered promiscuous mode 16:52:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r2, 0x0, 0x0) 16:52:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:10 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x7ff, 0x97e3]}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x80200, 0x0) connect$inet6(r4, &(0x7f0000000240)={0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3fd}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:52:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:10 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000080)={0x2, 0x0, 0x2002, 0x6, 0x3ff, {0x7, 0xfb}}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = syz_open_pts(r1, 0x80040) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000000540)={0x1, 0x1, 0x8, 0x0, 0x55, &(0x7f0000000140)}) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@huge_always={'huge=always'}}]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fsetxattr(r4, &(0x7f0000000580)=@known='trusted.overlay.opaque\x00', &(0x7f00000005c0)='huge=always', 0xb, 0x1) [ 293.399442][T10001] tmpfs: Bad value for 'huge' [ 294.087912][ T9998] tmpfs: Bad value for 'huge' 16:52:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r3, 0x4080aebf, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)=0x80018) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 16:52:11 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0xa80c0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x1c, 0x0, 0x8, 0x70bd2d, 0x0, {}, ["", "", "", "", "", ""]}, 0x1c}}, 0x40804) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @loopback, 0x0, 0x0, 0x0, 0x400, 0x0, 0x100020}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000180)={0x100, 0x6, 0x8000}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, 0x0, 0x4044804) 16:52:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r1, 0x0, 0x0) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000280)={r4}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x3, 0x4, 0x2, 0x8, 0x6, 0xc60, 0x6, 0xfffffffd, r4}, 0x20) 16:52:11 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x36488, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x100, 0x0) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r3, 0x40044103, &(0x7f00000000c0)=0x8) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x602400, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x81, &(0x7f00000012c0)={'broute\x00', 0x0, 0x3, 0x1000, [], 0x5, &(0x7f0000000200)=[{}, {}, {}, {}, {}], &(0x7f00000002c0)=""/4096}, &(0x7f0000001340)=0x78) splice(r4, 0x0, r5, 0x0, 0x1420000a77, 0x0) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000180)=0x4) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0xfffffffffffffe98) 16:52:11 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x403000) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80000000) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x2008001) r3 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) read(r3, &(0x7f0000000180)=""/19, 0xfffffe47) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x90d40, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) ioctl$KVM_GET_MSRS(r5, 0x4080aebf, &(0x7f0000000000)) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x20080, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r8, 0x4080aebf, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000318d4b3184423bb551d31ad858cc5d3855c845a412747cdadc86cc49f86b846b60298f69706fc2c1e9e5c335e9587b42d56f108ba5a444707ae5fd4870cea8b3d054d979998fa4d410c0a550b596c66098cb0546897d4410cb01ee894d0c25790366f475c14df2e5592a0e266fed3acccee6f27e63c963beb60f2d4fb41bd080c1cba91baa600d44e1b18d"]) dup2(r5, r8) [ 294.614704][T10032] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:52:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) [ 294.796462][ T280] tipc: TX() has been purged, node left! 16:52:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r3, 0x4080aebf, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)=0x80018) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 16:52:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:12 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e5910a07c9b7e1960b6a62ff20ec6b3914eee0120a2673298693089d63dcfd1232d26288a8887b487"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100)={0x3, 0x9, 0x400, 0x8001}, 0x8) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000000)={0xc001801, 0x5, 0x2}) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 16:52:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) [ 295.310449][ T26] audit: type=1804 audit(1589734332.599:46): pid=10035 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir993380686/syzkaller.LaHUE1/33/bus" dev="sda1" ino=15931 res=1 16:52:12 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) write$snddsp(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) [ 295.631566][ T26] audit: type=1804 audit(1589734332.919:47): pid=10078 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir993380686/syzkaller.LaHUE1/33/bus" dev="sda1" ino=15931 res=1 [ 295.691203][T10091] [ 295.693552][T10091] ======================================================== [ 295.700733][T10091] WARNING: possible irq lock inversion dependency detected [ 295.708270][T10091] 5.7.0-rc1-next-20200415-syzkaller #0 Not tainted [ 295.714763][T10091] -------------------------------------------------------- [ 295.722039][T10091] syz-executor.4/10091 just changed the state of lock: [ 295.728887][T10091] ffff88804f7cd478 (&info->lock){+.+.}-{2:2}, at: shmem_mfill_atomic_pte+0x1012/0x21c0 [ 295.739453][T10091] but this lock was taken by another, SOFTIRQ-safe lock in the past: [ 295.747504][T10091] (&xa->xa_lock#4){..-.}-{2:2} [ 295.747522][T10091] [ 295.747522][T10091] [ 295.747522][T10091] and interrupts could create inverse lock ordering between them. [ 295.747522][T10091] [ 295.766670][T10091] [ 295.766670][T10091] other info that might help us debug this: [ 295.774725][T10091] Possible interrupt unsafe locking scenario: [ 295.774725][T10091] [ 295.783045][T10091] CPU0 CPU1 [ 295.788404][T10091] ---- ---- [ 295.793765][T10091] lock(&info->lock); [ 295.797830][T10091] local_irq_disable(); [ 295.804732][T10091] lock(&xa->xa_lock#4); [ 295.811574][T10091] lock(&info->lock); [ 295.818154][T10091] [ 295.821605][T10091] lock(&xa->xa_lock#4); [ 295.826108][T10091] [ 295.826108][T10091] *** DEADLOCK *** [ 295.826108][T10091] [ 295.834254][T10091] 2 locks held by syz-executor.4/10091: [ 295.839814][T10091] #0: ffff888055c63928 (&mm->mmap_sem#2){++++}-{3:3}, at: mfill_zeropage+0xc1/0x10d0 [ 295.849460][T10091] #1: ffff888086319e58 (ptlock_ptr(page)#2){+.+.}-{2:2}, at: shmem_mfill_atomic_pte+0xf76/0x21c0 [ 295.860085][T10091] [ 295.860085][T10091] the shortest dependencies between 2nd lock and 1st lock: [ 295.869450][T10091] -> (&xa->xa_lock#4){..-.}-{2:2} { [ 295.874740][T10091] IN-SOFTIRQ-W at: [ 295.878845][T10091] lock_acquire+0x1f2/0x8f0 [ 295.885283][T10091] _raw_spin_lock_irqsave+0x8c/0xbf [ 295.892431][T10091] test_clear_page_writeback+0x1d7/0x11e0 [ 295.900031][T10091] end_page_writeback+0x239/0x520 [ 295.906956][T10091] end_buffer_async_write+0x442/0x5c0 [ 295.909292][ T26] audit: type=1804 audit(1589734333.199:48): pid=10072 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir993380686/syzkaller.LaHUE1/33/bus" dev="sda1" ino=15931 res=1 [ 295.914267][T10091] end_bio_bh_io_sync+0xe2/0x140 [ 295.914354][T10091] bio_endio+0x46a/0x820 [ 295.914373][T10091] blk_update_request+0x3e1/0xdc0 [ 295.956705][T10091] scsi_end_request+0x80/0x7b0 [ 295.963295][T10091] scsi_io_completion+0x1e7/0x1300 [ 295.970253][T10091] scsi_softirq_done+0x31e/0x3b0 [ 295.977082][T10091] blk_done_softirq+0x2db/0x440 [ 295.983809][T10091] __do_softirq+0x26c/0x9f7 [ 295.990182][T10091] irq_exit+0x192/0x1d0 [ 295.996168][T10091] do_IRQ+0xda/0x270 [ 296.001891][T10091] ret_from_intr+0x0/0x2b [ 296.006616][ T26] audit: type=1804 audit(1589734333.279:49): pid=10072 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir993380686/syzkaller.LaHUE1/33/bus" dev="sda1" ino=15931 res=1 [ 296.008088][T10091] __sanitizer_cov_trace_pc+0x0/0x60 [ 296.008159][T10091] tomoyo_domain_quota_is_ok+0x31b/0x500 [ 296.045398][T10091] tomoyo_supervisor+0x286/0xe60 [ 296.052165][T10091] tomoyo_path_permission+0x257/0x360 [ 296.059361][T10091] tomoyo_path_perm+0x2f6/0x400 [ 296.066099][T10091] security_inode_getattr+0xeb/0x150 [ 296.073265][T10091] vfs_getattr+0x22/0x60 [ 296.079328][T10091] vfs_statx_fd+0x6a/0xb0 [ 296.085480][T10091] __do_sys_newfstat+0x8b/0x100 [ 296.092220][T10091] do_syscall_64+0xf6/0x7d0 [ 296.098548][T10091] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 296.106511][T10091] INITIAL USE at: [ 296.110499][T10091] lock_acquire+0x1f2/0x8f0 [ 296.116738][T10091] _raw_spin_lock_irq+0x5b/0x80 [ 296.123415][T10091] __add_to_page_cache_locked+0x607/0xe00 [ 296.130870][T10091] add_to_page_cache_lru+0x1aa/0x700 [ 296.138159][T10091] do_read_cache_page+0x9ab/0x1810 [ 296.145062][T10091] read_part_sector+0xf6/0x600 [ 296.151564][T10091] adfspart_check_ICS+0x9d/0xc80 [ 296.159104][T10091] blk_add_partitions+0x474/0xe50 [ 296.165864][T10091] bdev_disk_changed+0x1fb/0x380 [ 296.172539][T10091] __blkdev_get+0xb15/0x1530 [ 296.178867][T10091] blkdev_get+0x41/0x2b0 [ 296.184848][T10091] __device_add_disk+0xa4f/0x1170 [ 296.191765][T10091] brd_init+0x297/0x463 [ 296.198094][T10091] do_one_initcall+0x10a/0x7d0 [ 296.204660][T10091] kernel_init_freeable+0x501/0x5ae [ 296.211618][T10091] kernel_init+0xd/0x1bb [ 296.217603][T10091] ret_from_fork+0x24/0x30 [ 296.223745][T10091] } [ 296.226469][T10091] ... key at: [] __key.18068+0x0/0x40 [ 296.234028][T10091] ... acquired at: [ 296.237923][T10091] _raw_spin_lock_irqsave+0x8c/0xbf [ 296.243295][T10091] shmem_uncharge+0x24/0x270 [ 296.248115][T10091] split_huge_page_to_list+0x274b/0x33b0 [ 296.253952][T10091] shmem_punch_compound+0x13e/0x1e0 [ 296.259322][T10091] shmem_undo_range+0x5f1/0x1b80 [ 296.264520][T10091] shmem_truncate_range+0x27/0xa0 [ 296.269805][T10091] shmem_setattr+0x8b6/0xc80 [ 296.274624][T10091] notify_change+0xb6d/0x1020 [ 296.279474][T10091] do_truncate+0x134/0x1f0 [ 296.284066][T10091] vfs_truncate+0x559/0x6e0 [ 296.288772][T10091] do_sys_truncate.part.0+0x11e/0x140 [ 296.294311][T10091] __x64_sys_truncate+0x69/0x90 [ 296.299337][T10091] do_syscall_64+0xf6/0x7d0 [ 296.304017][T10091] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 296.310063][T10091] [ 296.312380][T10091] -> (&info->lock){+.+.}-{2:2} { [ 296.317434][T10091] HARDIRQ-ON-W at: [ 296.321419][T10091] lock_acquire+0x1f2/0x8f0 [ 296.327568][T10091] _raw_spin_lock+0x2a/0x40 [ 296.333723][T10091] shmem_mfill_atomic_pte+0x1012/0x21c0 [ 296.340918][T10091] shmem_mfill_zeropage_pte+0x91/0xc0 [ 296.347935][T10091] mfill_zeropage+0xab0/0x10d0 [ 296.354411][T10091] userfaultfd_ioctl+0x1e6f/0x4210 [ 296.361175][T10091] ksys_ioctl+0x11a/0x180 [ 296.367160][T10091] __x64_sys_ioctl+0x6f/0xb0 [ 296.373399][T10091] do_syscall_64+0xf6/0x7d0 [ 296.379549][T10091] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 296.387078][T10091] SOFTIRQ-ON-W at: [ 296.391062][T10091] lock_acquire+0x1f2/0x8f0 [ 296.397238][T10091] _raw_spin_lock+0x2a/0x40 [ 296.403478][T10091] shmem_mfill_atomic_pte+0x1012/0x21c0 [ 296.410703][T10091] shmem_mfill_zeropage_pte+0x91/0xc0 [ 296.417724][T10091] mfill_zeropage+0xab0/0x10d0 [ 296.424141][T10091] userfaultfd_ioctl+0x1e6f/0x4210 [ 296.430905][T10091] ksys_ioctl+0x11a/0x180 [ 296.436885][T10091] __x64_sys_ioctl+0x6f/0xb0 [ 296.443128][T10091] do_syscall_64+0xf6/0x7d0 [ 296.449279][T10091] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 296.456804][T10091] INITIAL USE at: [ 296.460698][T10091] lock_acquire+0x1f2/0x8f0 [ 296.466761][T10091] _raw_spin_lock_irq+0x5b/0x80 [ 296.473198][T10091] shmem_getpage_gfp+0x937/0x2a10 [ 296.479780][T10091] shmem_write_begin+0x102/0x1e0 [ 296.486276][T10091] generic_perform_write+0x20a/0x4e0 [ 296.493127][T10091] __generic_file_write_iter+0x24c/0x610 [ 296.500321][T10091] generic_file_write_iter+0x3f3/0x630 [ 296.507338][T10091] new_sync_write+0x4a2/0x700 [ 296.513580][T10091] __vfs_write+0xc9/0x100 [ 296.519475][T10091] vfs_write+0x268/0x5d0 [ 296.525364][T10091] ksys_write+0x12d/0x250 [ 296.531256][T10091] do_syscall_64+0xf6/0x7d0 [ 296.537329][T10091] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 296.544776][T10091] } [ 296.547293][T10091] ... key at: [] __key.56628+0x0/0x40 [ 296.554742][T10091] ... acquired at: [ 296.558763][T10091] mark_lock+0x624/0xf10 [ 296.563173][T10091] __lock_acquire+0x98c/0x4c50 [ 296.568713][T10091] lock_acquire+0x1f2/0x8f0 [ 296.573387][T10091] _raw_spin_lock+0x2a/0x40 [ 296.578074][T10091] shmem_mfill_atomic_pte+0x1012/0x21c0 [ 296.583804][T10091] shmem_mfill_zeropage_pte+0x91/0xc0 [ 296.589352][T10091] mfill_zeropage+0xab0/0x10d0 [ 296.594285][T10091] userfaultfd_ioctl+0x1e6f/0x4210 [ 296.599571][T10091] ksys_ioctl+0x11a/0x180 [ 296.604186][T10091] __x64_sys_ioctl+0x6f/0xb0 [ 296.608949][T10091] do_syscall_64+0xf6/0x7d0 [ 296.613818][T10091] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 296.619889][T10091] [ 296.622204][T10091] [ 296.622204][T10091] stack backtrace: [ 296.628216][T10091] CPU: 0 PID: 10091 Comm: syz-executor.4 Not tainted 5.7.0-rc1-next-20200415-syzkaller #0 [ 296.638184][T10091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.648360][T10091] Call Trace: [ 296.651721][T10091] dump_stack+0x188/0x20d [ 296.656106][T10091] check_usage_backwards.cold+0x1d/0x26 [ 296.661661][T10091] ? print_shortest_lock_dependencies+0x80/0x80 [ 296.668003][T10091] ? stack_trace_save+0x8c/0xc0 [ 296.672860][T10091] ? stack_trace_consume_entry+0x160/0x160 [ 296.678668][T10091] ? print_usage_bug+0x240/0x240 [ 296.683616][T10091] ? save_trace+0x5da/0x9f0 [ 296.688139][T10091] mark_lock+0x624/0xf10 [ 296.692390][T10091] ? print_shortest_lock_dependencies+0x80/0x80 [ 296.698720][T10091] ? print_usage_bug+0x240/0x240 [ 296.703657][T10091] ? print_usage_bug+0x240/0x240 [ 296.708594][T10091] __lock_acquire+0x98c/0x4c50 [ 296.713803][T10091] ? smp_apic_timer_interrupt+0x1b6/0x600 [ 296.719521][T10091] ? retint_kernel+0x2b/0x2b [ 296.724206][T10091] ? mark_held_locks+0xe0/0xe0 [ 296.728976][T10091] lock_acquire+0x1f2/0x8f0 [ 296.733482][T10091] ? shmem_mfill_atomic_pte+0x1012/0x21c0 [ 296.739205][T10091] ? lock_release+0x800/0x800 [ 296.743946][T10091] ? __this_cpu_preempt_check+0x84/0x190 [ 296.749581][T10091] ? do_raw_spin_lock+0x129/0x2e0 [ 296.754605][T10091] ? rwlock_bug.part.0+0x90/0x90 [ 296.759543][T10091] _raw_spin_lock+0x2a/0x40 [ 296.764048][T10091] ? shmem_mfill_atomic_pte+0x1012/0x21c0 [ 296.769765][T10091] shmem_mfill_atomic_pte+0x1012/0x21c0 [ 296.775323][T10091] ? shmem_add_to_page_cache+0x1390/0x1390 [ 296.781139][T10091] ? lock_downgrade+0x840/0x840 [ 296.785986][T10091] ? retint_kernel+0x2b/0x2b [ 296.790924][T10091] shmem_mfill_zeropage_pte+0x91/0xc0 [ 296.796300][T10091] ? shmem_mcopy_atomic_pte+0x50/0x50 [ 296.801684][T10091] ? do_raw_spin_unlock+0x171/0x260 [ 296.807587][T10091] ? _raw_spin_unlock+0x24/0x40 [ 296.812437][T10091] mfill_zeropage+0xab0/0x10d0 [ 296.817266][T10091] ? _copy_from_user+0x13c/0x1a0 [ 296.822291][T10091] userfaultfd_ioctl+0x1e6f/0x4210 [ 296.827400][T10091] ? userfaultfd_read+0x16f0/0x16f0 [ 296.832623][T10091] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 296.838523][T10091] ? do_vfs_ioctl+0x50c/0x12d0 [ 296.843287][T10091] ? ioctl_file_clone+0x180/0x180 [ 296.848311][T10091] ? lockdep_hardirqs_on+0x463/0x620 [ 296.853595][T10091] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 296.859054][T10091] ? smp_apic_timer_interrupt+0x1b6/0x600 [ 296.864773][T10091] ? retint_kernel+0x2b/0x2b [ 296.869371][T10091] ? userfaultfd_read+0x16f0/0x16f0 [ 296.874593][T10091] ? ksys_ioctl+0x11a/0x180 [ 296.879193][T10091] ksys_ioctl+0x11a/0x180 [ 296.883523][T10091] __x64_sys_ioctl+0x6f/0xb0 [ 296.888110][T10091] ? lockdep_hardirqs_on+0x463/0x620 [ 296.893392][T10091] do_syscall_64+0xf6/0x7d0 [ 296.898244][T10091] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 296.904128][T10091] RIP: 0033:0x45ca29 [ 296.908016][T10091] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.927649][T10091] RSP: 002b:00007f915841bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 296.936056][T10091] RAX: ffffffffffffffda RBX: 00000000004efe00 RCX: 000000000045ca29 [ 296.944289][T10091] RDX: 0000000020000080 RSI: 00000000c020aa04 RDI: 0000000000000004 [ 296.954085][T10091] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 296.962153][T10091] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 296.970647][T10091] R13: 00000000000005bf R14: 00000000004c87e7 R15: 00007f915841c6d4 16:52:14 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d00", 0xe}], 0x1}, 0x4048080) r0 = socket(0x10, 0x80002, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x20, r2, 0x5, 0x0, 0x0, {0x5}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x3, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 16:52:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:14 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r1) 16:52:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @local}}) write$tun(r0, &(0x7f0000000340)={@void, @val={0x11, 0x1}, @eth={@local, @broadcast, @val={@void, {0x8100, 0x7, 0x1}}, {@generic={0x6000, "610f54584980a31449063685699a46653798753adb1e9031f75f215b6bbe3fa3294180edeacd0f161f0e809a3b4491dc5c725c8aaebfc3fca88aa4647acad3ab65e1a039eb22fe659be976de8102556af9dd84"}}}}, 0x6f) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000180)) 16:52:14 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r6}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r6, 0x8, 0x81}, &(0x7f00000004c0)=0xc) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) recvfrom(r7, &(0x7f0000000040)=""/39, 0x27, 0x0, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @empty, 'syzkaller0\x00'}}, 0x80) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000002c00270d00000000000000e100000000", @ANYRES32=r3, @ANYBLOB="0000000000000000ffff000008000100627066001800020006000400010000000c0005000000000000000000"], 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 16:52:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) [ 297.515809][T10132] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 16:52:15 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:15 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x4000000000000276}}}}}}}, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x5b1c42, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r1) 16:52:15 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[0xffffffffffffffff, r2]}, 0x2) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x38, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) 16:52:15 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:15 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r6}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r6, 0x8, 0x81}, &(0x7f00000004c0)=0xc) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) recvfrom(r7, &(0x7f0000000040)=""/39, 0x27, 0x0, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @empty, 'syzkaller0\x00'}}, 0x80) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000002c00270d00000000000000e100000000", @ANYRES32=r3, @ANYBLOB="0000000000000000ffff000008000100627066001800020006000400010000000c0005000000000000000000"], 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 298.273404][T10159] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 16:52:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) [ 298.445406][T10171] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 16:52:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, 0x0, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, 0x0, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:16 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, 0x0, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:16 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x4000000000000276}}}}}}}, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x5b1c42, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r1) 16:52:16 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[0xffffffffffffffff, r2]}, 0x2) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x38, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) 16:52:16 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:16 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r6}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r6, 0x8, 0x81}, &(0x7f00000004c0)=0xc) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) recvfrom(r7, &(0x7f0000000040)=""/39, 0x27, 0x0, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @empty, 'syzkaller0\x00'}}, 0x80) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000002c00270d00000000000000e100000000", @ANYRES32=r3, @ANYBLOB="0000000000000000ffff000008000100627066001800020006000400010000000c0005000000000000000000"], 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 16:52:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) accept$inet(r3, 0x0, 0x0) 16:52:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) accept$inet(r3, 0x0, 0x0) [ 299.364072][T10219] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 16:52:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) accept$inet(r3, 0x0, 0x0) 16:52:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) accept$inet(r3, 0x0, 0x0) 16:52:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) accept$inet(r3, 0x0, 0x0) 16:52:17 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='lo\x00'], &(0x7f00000007c0)=[&(0x7f00000003c0)='/dev/ttyS3\x00', &(0x7f0000000400)='-\x00', &(0x7f0000000440)='(\xe0\xf5\x00', &(0x7f0000000880)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.\x01o\x19\x04J\x8f\xf8@\xd0\x80\xe3jC\xdd3\x93\xbdF\x83\xab\xff\xb8\xa476\xfbj\xb0i\xf1\x9b\xbb 5\t\x0f3$B\xf7\xb4\xba\x84\xa4v\xab-g\xc1\x9fl\xb6E\xa3A\xe0\xffaW\xe7\xfb\x9d\x03\xe2\x8b\x12\xf8S\n1\xb7T\x82U\x1b\xbf\v\xe1\x04\xd5Y\xd4\xb0;\xf1\x82=\xc9\xd5\x1eZ\xbb\x9b\xfe\"\xb9\xe8Y%\x87<\x82\x05\xba_\xf3\x8ex\xd8\x81\xfe6G@\b\x00'/380, &(0x7f0000000500)='md5sum\x00', &(0x7f0000000640)='em0vmnet1em0@*\x00', &(0x7f0000000680)='eth0user\x00', &(0x7f00000006c0)='$)C', &(0x7f0000000700)='GPLeth0\x00', &(0x7f0000000740)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r1) 16:52:17 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[0xffffffffffffffff, r2]}, 0x2) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x38, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) 16:52:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(0xffffffffffffffff, 0x0, 0x0) 16:52:17 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r6}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r6, 0x8, 0x81}, &(0x7f00000004c0)=0xc) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) recvfrom(r7, &(0x7f0000000040)=""/39, 0x27, 0x0, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @empty, 'syzkaller0\x00'}}, 0x80) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000002c00270d00000000000000e100000000", @ANYRES32=r3, @ANYBLOB="0000000000000000ffff000008000100627066001800020006000400010000000c0005000000000000000000"], 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 16:52:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(0xffffffffffffffff, 0x0, 0x0) 16:52:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(0xffffffffffffffff, 0x0, 0x0) 16:52:17 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='lo\x00'], &(0x7f00000007c0)=[&(0x7f00000003c0)='/dev/ttyS3\x00', &(0x7f0000000400)='-\x00', &(0x7f0000000440)='(\xe0\xf5\x00', &(0x7f0000000880)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.\x01o\x19\x04J\x8f\xf8@\xd0\x80\xe3jC\xdd3\x93\xbdF\x83\xab\xff\xb8\xa476\xfbj\xb0i\xf1\x9b\xbb 5\t\x0f3$B\xf7\xb4\xba\x84\xa4v\xab-g\xc1\x9fl\xb6E\xa3A\xe0\xffaW\xe7\xfb\x9d\x03\xe2\x8b\x12\xf8S\n1\xb7T\x82U\x1b\xbf\v\xe1\x04\xd5Y\xd4\xb0;\xf1\x82=\xc9\xd5\x1eZ\xbb\x9b\xfe\"\xb9\xe8Y%\x87<\x82\x05\xba_\xf3\x8ex\xd8\x81\xfe6G@\b\x00'/380, &(0x7f0000000500)='md5sum\x00', &(0x7f0000000640)='em0vmnet1em0@*\x00', &(0x7f0000000680)='eth0user\x00', &(0x7f00000006c0)='$)C', &(0x7f0000000700)='GPLeth0\x00', &(0x7f0000000740)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) 16:52:18 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[0xffffffffffffffff, r2]}, 0x2) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x38, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) 16:52:18 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='lo\x00'], &(0x7f00000007c0)=[&(0x7f00000003c0)='/dev/ttyS3\x00', &(0x7f0000000400)='-\x00', &(0x7f0000000440)='(\xe0\xf5\x00', &(0x7f0000000880)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.\x01o\x19\x04J\x8f\xf8@\xd0\x80\xe3jC\xdd3\x93\xbdF\x83\xab\xff\xb8\xa476\xfbj\xb0i\xf1\x9b\xbb 5\t\x0f3$B\xf7\xb4\xba\x84\xa4v\xab-g\xc1\x9fl\xb6E\xa3A\xe0\xffaW\xe7\xfb\x9d\x03\xe2\x8b\x12\xf8S\n1\xb7T\x82U\x1b\xbf\v\xe1\x04\xd5Y\xd4\xb0;\xf1\x82=\xc9\xd5\x1eZ\xbb\x9b\xfe\"\xb9\xe8Y%\x87<\x82\x05\xba_\xf3\x8ex\xd8\x81\xfe6G@\b\x00'/380, &(0x7f0000000500)='md5sum\x00', &(0x7f0000000640)='em0vmnet1em0@*\x00', &(0x7f0000000680)='eth0user\x00', &(0x7f00000006c0)='$)C', &(0x7f0000000700)='GPLeth0\x00', &(0x7f0000000740)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r6}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r6, 0x8, 0x81}, &(0x7f00000004c0)=0xc) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) recvfrom(r7, &(0x7f0000000040)=""/39, 0x27, 0x0, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @empty, 'syzkaller0\x00'}}, 0x80) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000002c00270d00000000000000e100000000", @ANYRES32=r3, @ANYBLOB="0000000000000000ffff000008000100627066001800020006000400010000000c0005000000000000000000"], 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 16:52:18 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[0xffffffffffffffff, r2]}, 0x2) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) 16:52:19 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r6}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r6, 0x8, 0x81}, &(0x7f00000004c0)=0xc) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) recvfrom(r7, &(0x7f0000000040)=""/39, 0x27, 0x0, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @empty, 'syzkaller0\x00'}}, 0x80) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000002c00270d00000000000000e100000000", @ANYRES32=r3, @ANYBLOB="0000000000000000ffff000008000100627066001800020006000400010000000c0005000000000000000000"], 0x44}}, 0x0) 16:52:19 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x4000000000000276}}}}}}}, 0x0) 16:52:19 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[0xffffffffffffffff, r2]}, 0x2) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) 16:52:20 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='lo\x00'], &(0x7f00000007c0)=[&(0x7f00000003c0)='/dev/ttyS3\x00', &(0x7f0000000400)='-\x00', &(0x7f0000000440)='(\xe0\xf5\x00', &(0x7f0000000880)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.\x01o\x19\x04J\x8f\xf8@\xd0\x80\xe3jC\xdd3\x93\xbdF\x83\xab\xff\xb8\xa476\xfbj\xb0i\xf1\x9b\xbb 5\t\x0f3$B\xf7\xb4\xba\x84\xa4v\xab-g\xc1\x9fl\xb6E\xa3A\xe0\xffaW\xe7\xfb\x9d\x03\xe2\x8b\x12\xf8S\n1\xb7T\x82U\x1b\xbf\v\xe1\x04\xd5Y\xd4\xb0;\xf1\x82=\xc9\xd5\x1eZ\xbb\x9b\xfe\"\xb9\xe8Y%\x87<\x82\x05\xba_\xf3\x8ex\xd8\x81\xfe6G@\b\x00'/380, &(0x7f0000000500)='md5sum\x00', &(0x7f0000000640)='em0vmnet1em0@*\x00', &(0x7f0000000680)='eth0user\x00', &(0x7f00000006c0)='$)C', &(0x7f0000000700)='GPLeth0\x00', &(0x7f0000000740)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r6}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r6, 0x8, 0x81}, &(0x7f00000004c0)=0xc) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) recvfrom(r7, &(0x7f0000000040)=""/39, 0x27, 0x0, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @empty, 'syzkaller0\x00'}}, 0x80) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) 16:52:20 executing program 4: open(0x0, 0x40, 0x11) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r6}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r6, 0x8, 0x81}, &(0x7f00000004c0)=0xc) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) recvfrom(r7, &(0x7f0000000040)=""/39, 0x27, 0x0, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @empty, 'syzkaller0\x00'}}, 0x80) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000002c00270d00000000000000e100000000", @ANYRES32=r3, @ANYBLOB="0000000000000000ffff000008000100627066001800020006000400010000000c0005000000000000000000"], 0x44}}, 0x0) 16:52:20 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='lo\x00'], &(0x7f00000007c0)=[&(0x7f00000003c0)='/dev/ttyS3\x00', &(0x7f0000000400)='-\x00', &(0x7f0000000440)='(\xe0\xf5\x00', &(0x7f0000000880)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.\x01o\x19\x04J\x8f\xf8@\xd0\x80\xe3jC\xdd3\x93\xbdF\x83\xab\xff\xb8\xa476\xfbj\xb0i\xf1\x9b\xbb 5\t\x0f3$B\xf7\xb4\xba\x84\xa4v\xab-g\xc1\x9fl\xb6E\xa3A\xe0\xffaW\xe7\xfb\x9d\x03\xe2\x8b\x12\xf8S\n1\xb7T\x82U\x1b\xbf\v\xe1\x04\xd5Y\xd4\xb0;\xf1\x82=\xc9\xd5\x1eZ\xbb\x9b\xfe\"\xb9\xe8Y%\x87<\x82\x05\xba_\xf3\x8ex\xd8\x81\xfe6G@\b\x00'/380, &(0x7f0000000500)='md5sum\x00', &(0x7f0000000640)='em0vmnet1em0@*\x00', &(0x7f0000000680)='eth0user\x00', &(0x7f00000006c0)='$)C', &(0x7f0000000700)='GPLeth0\x00', &(0x7f0000000740)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[0xffffffffffffffff, r2]}, 0x2) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) 16:52:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x11) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r6}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r6, 0x8, 0x81}, &(0x7f00000004c0)=0xc) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) recvfrom(r7, &(0x7f0000000040)=""/39, 0x27, 0x0, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @empty, 'syzkaller0\x00'}}, 0x80) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) 16:52:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x11) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r6}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r6, 0x8, 0x81}, &(0x7f00000004c0)=0xc) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r7 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000) accept$inet(r7, 0x0, 0x0) recvfrom(r7, &(0x7f0000000040)=""/39, 0x27, 0x0, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @empty, 'syzkaller0\x00'}}, 0x80) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000002c00270d00000000000000e100000000", @ANYRES32=r3, @ANYBLOB="0000000000000000ffff000008000100627066001800020006000400010000000c0005000000000000000000"], 0x44}}, 0x0) 16:52:21 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x11) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='lo\x00'], &(0x7f00000007c0)=[&(0x7f00000003c0)='/dev/ttyS3\x00', &(0x7f0000000400)='-\x00', &(0x7f0000000440)='(\xe0\xf5\x00', &(0x7f0000000880)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.\x01o\x19\x04J\x8f\xf8@\xd0\x80\xe3jC\xdd3\x93\xbdF\x83\xab\xff\xb8\xa476\xfbj\xb0i\xf1\x9b\xbb 5\t\x0f3$B\xf7\xb4\xba\x84\xa4v\xab-g\xc1\x9fl\xb6E\xa3A\xe0\xffaW\xe7\xfb\x9d\x03\xe2\x8b\x12\xf8S\n1\xb7T\x82U\x1b\xbf\v\xe1\x04\xd5Y\xd4\xb0;\xf1\x82=\xc9\xd5\x1eZ\xbb\x9b\xfe\"\xb9\xe8Y%\x87<\x82\x05\xba_\xf3\x8ex\xd8\x81\xfe6G@\b\x00'/380, &(0x7f0000000500)='md5sum\x00', &(0x7f0000000640)='em0vmnet1em0@*\x00', &(0x7f0000000680)='eth0user\x00', &(0x7f00000006c0)='$)C', &(0x7f0000000700)='GPLeth0\x00', &(0x7f0000000740)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.