a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)}], 0x3, 0x81805, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e21, @remote}}, 0x0, 0x0, 0x2d, 0x0, "2bd9f82f66b69749c9e8a393ebaa176ada273b40f39b0953c0efe25baa4b0c18960931d1d6b77365f86aa7e2ba3a375744856050aaba1e67b612763bd7119312df3db72a20027c055d650bf25f4ad9c9"}, 0xd8) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x1) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006880)=[{&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001840)=[{&(0x7f00000004c0)="fbc14459a778e30aa00a70a70cbd84348b075d2822805b0dcdd2e42777edab5f904e38c9d3cf9720839d52087ae44f72ed6a158387b9f5cc5891d87a341fa519d8cbe378a68dd2b140f4ab2a2e3079b3bebb8f0dea8a3bdac4c5f22cabf46485ccb0b514697409532e64800910ac839a0a0863546e579486e6342226e901b894801f70343a80c06b40e7dac0723d688575e6efff0e8c905764408678b83e72a97e19469ea2e49468bd6ea7fcabb965f193892e8d1ff7a3a15ad5", 0xba}, {&(0x7f0000001740)="b467a1e551a18c91cb45495a49115b7e481f00829cec90be189216e21cadac60149e67762aa08595d8432805d3cec42ebaf8407c6c05adce9b26d57c39f1896fdfa1597d0bdd840cebb1e94439f329b911a083fbc6f5c908b963746fc10b2d65140f057bb1b9ddc23bc7506718fbbcf554a8c003fbd84aa2f0e0dc0eb58d391660aaf3ecff69837086344f", 0x8b}, {&(0x7f0000000680)="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", 0xfef}, {&(0x7f0000001680)="4c41cfa1c08a2148c02b6c23470aebcd74175d5e1489e50fe2f0400d8cbb31b6b1557d329e0d1b98c39ac242af91bd33d7b3db9f8bbe3587f655b172e62016e49695b296adba2af7cbbef43d7b2c58752da149c7b9e5030bea2d90e5a666862deb7051f21bad47ce2588676548db19d417b42bb8a462b795266ce4f21bf611aa04e001c4074cef0db846bc747de3f441e00ac1e5b40db9676373ab6c040f5e0357dfd94f2a6635134b7b50657f196a9cddda2f368bdaec9472d4", 0xba}], 0x4, &(0x7f0000001ac0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r7, @ANYBLOB="0001000000010000000020000000000000000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="00000000903c43f0dfb0ff47f114d64e3b"], 0xb8, 0x1}, {&(0x7f0000001c00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001a40)=[{&(0x7f0000001c80)="0784d649d8125d953aa6053d7ed134c1b5256d4ef8d51118b4d43bb88bcb284e007839bf78561aea34aa0eebf44d0186fb3e02961af2cb1e9b2810f580f496cc5050cbd3d9b1e5e6d3ae5bc26e96f00046c75c550bd5183cfa75bfdc5e29a8c5c460a45e4fc82b5a9c8ef1a78f0c59a790e5174c80f3c1d1db63456b2a16593da59f1dda4099cd721a6ff636145f1fb0d946a15ea4611cd99bf91b55bc39acc58a44ab14758c3ef7785df0", 0xab}, {0x0}, {&(0x7f0000001ec0)="480e3e", 0x3}, {0x0}, {&(0x7f0000000440)="14babe0617ce3d5fa8aefe0661fdc765bb8ca1c0c2f54d3ed8f82e36f4b86b5338bba87245c6acc7e4a456fcab31375fafff0c5d6fb6aba499e53d166d39cbf1d12e03e9d62c50454b4b9465659f8ffeb03058", 0x53}, {&(0x7f0000001940)="e1db2929113170494236c8d870ba896d3f954cd8f131ec728b35e8fb68dff2dc777c34d829059ce618c2301c7ed5a1ca8bfed0486d667edce4cf1b8ca79fee50b333e6f52b6d", 0x46}, {&(0x7f00000019c0)="f9083d3e36a39638ad4cf90ec1715d0156654eab607b3a19aaf557cda5de90c88d5b20deff13fc0fd548fc02c182a01ceb699f88351c2b7c7fd18962ef425cb619eb1c431d47834de25b526a52dcde97eac221f1ea295301aefe07767585e1c95689be1121", 0x65}], 0x7, 0x0, 0x0, 0x200448c1}], 0x2, 0x20004080) memfd_create(&(0x7f00000000c0)='\\[)\\,\x00', 0x2) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 22:41:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x48}, {0x2}, {0x6}]}) 22:41:11 executing program 2: r0 = eventfd(0x8) read$eventfd(r0, &(0x7f0000000040), 0x8) [ 478.184098][ T36] audit: type=1326 audit(1622500871.933:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14398 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f1e549 code=0x0 [ 478.416470][T14401] loop7: detected capacity change from 0 to 1036 [ 478.746246][ T36] audit: type=1326 audit(1622500872.503:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14410 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x54}, {0x6}]}) 22:41:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000400)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) 22:41:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) [ 479.004726][ T36] audit: type=1326 audit(1622500872.753:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14398 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f1e549 code=0x0 [ 479.264422][ T36] audit: type=1326 audit(1622500873.013:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14414 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7fb4549 code=0x0 22:41:13 executing program 3: sched_setattr(0x0, &(0x7f0000000140)={0x9c, 0x0, 0x2e}, 0x0) [ 479.558903][ T36] audit: type=1326 audit(1622500873.313:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14410 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:13 executing program 4: setfsuid(0xee01) add_key$keyring(&(0x7f0000001a00), 0x0, 0x0, 0x0, 0xffffffffffffffff) setfsuid(0x0) 22:41:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}}) 22:41:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x4c}, {0x2}, {0x6}]}) 22:41:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x400c55cb, &(0x7f0000000080)) [ 480.101975][ T36] audit: type=1326 audit(1622500873.853:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14414 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7fb4549 code=0x0 22:41:14 executing program 4: setxattr$system_posix_acl(&(0x7f00000001c0)='.\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {}, [{0x10}]}, 0x2c, 0x0) [ 480.281741][ T36] audit: type=1326 audit(1622500874.033:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14433 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x5}, {0x6}]}) 22:41:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x3d}]}) 22:41:14 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) [ 480.814988][ T36] audit: type=1326 audit(1622500874.563:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14442 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f61549 code=0x0 22:41:14 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000140)={'ip6gre0\x00', @ifru_mtu}) 22:41:14 executing program 4: syz_open_dev$loop(&(0x7f0000000200), 0x0, 0x3) [ 481.112933][ T36] audit: type=1326 audit(1622500874.863:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14433 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x3, 0x2, 0x801}, 0x14}}, 0x0) 22:41:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x68}, {0x2}, {0x6}]}) [ 481.666843][ T36] audit: type=1326 audit(1622500875.423:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14442 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f61549 code=0x0 22:41:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @void}}}, 0x1c}}, 0x0) 22:41:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)=@newnexthop={0x18, 0x68, 0x1}, 0x18}}, 0x0) [ 481.893236][ T36] audit: type=1326 audit(1622500875.643:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14459 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:15 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x8000552c, 0x0) 22:41:15 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003980), 0x0, 0x20, &(0x7f0000003a80)={0x0, 0x989680}) 22:41:16 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 22:41:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_FD={0x8}}}]}, 0x2c}}, 0x0) 22:41:16 executing program 5: bpf$MAP_CREATE(0x2, &(0x7f00000000c0), 0x40) 22:41:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) ioctl$UI_ABS_SETUP(r0, 0x40045568, &(0x7f0000000080)) 22:41:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x6c}, {0x2}, {0x6}]}) 22:41:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140), 0x4) 22:41:17 executing program 5: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000001a00), &(0x7f0000001a40)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000001dc0), &(0x7f0000001e00)={'fscrypt:', @desc4}, &(0x7f0000001e40)={0x0, "427602e1a644ff2de3c16bc59e4a57db4507a8d24bff710b1c78f11fbd622c81c65b1a95a70f23037ed4c21eea68dabb75db0b57d6909b79503073180cded8b2"}, 0x48, r0) keyctl$invalidate(0x15, r1) keyctl$chown(0x4, r1, 0x0, 0xee01) 22:41:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@ipv4_delrule={0x2c, 0x1a, 0x1, 0x0, 0x0, {}, [@FRA_DST={0x8, 0x1, @multicast1}, @FRA_SRC={0x8, 0x2, @private=0xa010101}]}, 0x2c}}, 0x0) 22:41:17 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 22:41:17 executing program 2: r0 = add_key$keyring(&(0x7f0000001a00), &(0x7f0000001a40)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f0000000000)=""/200, 0xc8) 22:41:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:18 executing program 5: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_dev$hidraw(&(0x7f0000000040), 0x400, 0x42400) r1 = dup3(r0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) r3 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000080)='./file1\x00', 0x40000000, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)="9962703a67500a3b973b739aa8ee15701454a81c0e19f14d12a7c2108a6506d449d0c31fc9d21a77300b4143540cb6b363a8645132d4afe0147962b5c1792eb4d26b2ab1f976bba6cb06d4a6d42fd60b1035d4f45a6cb49bd9b98da7df31897d5818dd9f", 0x64, 0x604}], 0x0, &(0x7f0000000100)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}]}) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) dup2(r3, r2) write$binfmt_elf64(r1, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x40, 0x40, 0x4, 0x61, 0x2, 0x6, 0x9, 0x1d1, 0x40, 0x1eb, 0x1, 0x80, 0x38, 0x2, 0x9, 0x7, 0x1}, [{0x6, 0x0, 0x5, 0x0, 0x100000000, 0x80}], "150068e615c8c1587cc67d45ee9f2a8a7166a05a17d165b378fa7c745c853c99b918410b407bf8422ac5e8d9fec586ac105f4ff7e84ff917f5d1f51c0ff79ca3d7364ff6c5f3f96fc962919680038ab63e746b6641be6f646d10cf03587f54a0448b47be721e780ef87629d84a792eb0b8214dedfd2d06414b236dad286972", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x7f7) getpid() inotify_init1(0x0) 22:41:18 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x8906, 0x0) [ 484.375045][ T36] kauditd_printk_skb: 2 callbacks suppressed [ 484.375105][ T36] audit: type=1326 audit(1622500878.123:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14488 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:18 executing program 3: r0 = add_key$keyring(&(0x7f0000001a00), &(0x7f0000001a40)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x7, r0, 0xee00, 0xffffffffffffffff) 22:41:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x74}, {0x2}, {0x6}]}) 22:41:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="6c0000001a00edac00000000000000000a"], 0x6c}}, 0x0) [ 484.829125][T14510] IPVS: ftp: loaded support on port[0] = 21 [ 485.133090][ T36] audit: type=1326 audit(1622500878.883:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14533 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:19 executing program 3: memfd_create(&(0x7f0000000280)='\\%]$$\x00', 0x5) 22:41:19 executing program 4: r0 = add_key$keyring(&(0x7f0000001a00), &(0x7f0000001a40)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$chown(0xb, r0, 0xee00, 0xffffffffffffffff) [ 485.368649][T14543] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. 22:41:19 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x8901, 0x0) [ 485.971932][ T36] audit: type=1326 audit(1622500879.723:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14533 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{}, {0x4d}]}) 22:41:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@ipv6_newroute={0x1c, 0x68, 0x3acf9aa54b7daced}, 0x1c}}, 0x0) 22:41:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x7a}, {0x2}, {0x6}]}) 22:41:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 486.733579][T14558] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 486.788648][ T36] audit: type=1326 audit(1622500880.543:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14557 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 487.272401][T14510] loop5: detected capacity change from 0 to 264192 [ 487.492350][T14514] IPVS: ftp: loaded support on port[0] = 21 [ 487.617731][ T36] audit: type=1326 audit(1622500881.373:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14557 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:22 executing program 5: keyctl$chown(0x1e, 0x0, 0xee00, 0xffffffffffffffff) 22:41:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@newnexthop={0x1c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_FDB={0x4}]}, 0x1c}}, 0x0) 22:41:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@ipv6_newroute={0x1c, 0x18, 0x3acf9aa54b7daced, 0x0, 0x0, {0xa, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 22:41:22 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x4b60, 0x0) 22:41:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c}, {0x2}, {0x6}]}) 22:41:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 489.356646][ T36] audit: type=1326 audit(1622500883.113:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14599 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x17, 0x7, 0x0, 0x9}, 0x40) 22:41:23 executing program 2: bpf$MAP_CREATE(0x9, &(0x7f00000000c0), 0x40) 22:41:23 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x4004556a, &(0x7f0000000080)) [ 490.173742][ T36] audit: type=1326 audit(1622500883.923:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14599 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:24 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 22:41:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x2}, {0x2}, {0x6}]}) 22:41:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@ipv6_newroute={0x34, 0x11, 0x3acf9aa54b7daced, 0x0, 0x0, {}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @mcast1}}]}, 0x34}}, 0x0) [ 490.890026][ T36] audit: type=1326 audit(1622500884.643:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14621 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:24 executing program 5: request_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0xffffffffffffffff) 22:41:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8918, 0x0) 22:41:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:25 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40005504, 0x0) 22:41:25 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045564, 0x0) [ 491.720369][ T36] audit: type=1326 audit(1622500885.473:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14621 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=@ipv4_delrule={0x18, 0x14, 0x1}, 0x1c}}, 0x0) 22:41:25 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0) 22:41:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x3}, {0x2}, {0x6}]}) 22:41:25 executing program 2: add_key$keyring(&(0x7f0000001a00), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "c0644e63d319b368c6fa6c78d06c39833406255e470015e0bef1f529b30b7d9965b3ff7916012dbdae475e527c50a0a4eb762b5abae8859b6edb7cd2cfec2e2d"}, 0x48, 0xfffffffffffffffb) keyctl$chown(0x4, r0, 0x0, 0x0) 22:41:26 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) getsockname$packet(r0, 0x0, 0x0) 22:41:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$link(0x8, r0, r1) 22:41:26 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000000)={'vcan0\x00', @ifru_map}) [ 492.604454][ T36] audit: type=1326 audit(1622500886.353:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14647 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000280), 0x4) 22:41:26 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) ioctl$UI_ABS_SETUP(r0, 0x4004556d, 0x0) 22:41:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:27 executing program 5: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x218043, 0x0) [ 493.411694][ T36] audit: type=1326 audit(1622500887.163:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14647 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newroute={0x34, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_PREFSRC={0x8, 0x7, @private}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_FD={0x8}}}]}, 0x34}}, 0x0) 22:41:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x4}, {0x2}, {0x6}]}) 22:41:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x30}]}) 22:41:27 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000080)={@multicast, @empty, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8100}}}}}}, 0x0) [ 494.284098][ T36] audit: type=1326 audit(1622500888.033:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14674 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:28 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000004580)) 22:41:28 executing program 4: r0 = add_key$keyring(&(0x7f0000001a00), &(0x7f0000001a40)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "3bff4aedb6f3692c55e54bab7b7c5291a1a154bd4cf0f24a0568eeaa963ec9558a80cd75908a6b848fdc339a875237a4ad1084689718b4a8ae5d3f3faed6dacd"}, 0x48, r0) keyctl$search(0xa, r1, &(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x3}, r0) 22:41:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{}, {0x64}]}) 22:41:28 executing program 3: prctl$PR_SET_MM_MAP_SIZE(0x24, 0xf, 0x0) 22:41:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x7}]}) [ 495.145283][ T36] audit: type=1326 audit(1622500888.903:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14674 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)=@newnexthop={0x34, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_GROUP={0x1c, 0x2, [{0x2}, {}, {0x2}]}]}, 0x34}}, 0x0) 22:41:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x5}, {0x2}, {0x6}]}) 22:41:29 executing program 2: prctl$PR_MCE_KILL(0xf, 0x7ffffffff000, 0x0) 22:41:29 executing program 3: fcntl$setsig(0xffffffffffffffff, 0xa, 0xb) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000240)={'L+', 0x8000000010000}, 0x16, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d945dbe90b2e81f8d1ecd31c6191e54bf1f85299bdc98b0", @ANYRES16=r0, @ANYRESOCT, @ANYRESHEX=0x0, @ANYRESHEX, @ANYBLOB=',dont_hash-eui', @ANYRESDEC=0x0, @ANYBLOB="2c6556118389eeaa972ded0767e035518cb51437cfdbdb239887cca341d82cbca20193c410919d4d101b332339f334040896ccda4013c763146772633ed7056fa7157cd5ae3a0d4792a0a697d46734df09e2981cbb463a0adafdb2880c99a571cdbc5cfbbafb97dee269652923ee02b2b728b5920696f4cc41bbc026a8845c3f72886f59ffbf2e0359d1b630e7bc64b186d9adc7991b96361fa2c85076be805153c8a2917532", @ANYBLOB, @ANYBLOB]) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000, 0x3}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000880)="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", 0x2000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@dev, @in6=@private2}}, {{@in6=@mcast1}, 0x0, @in6=@private0}}, &(0x7f0000000280)=0xe4) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) [ 495.666437][ T36] audit: type=1326 audit(1622500889.423:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14693 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f61549 code=0x0 22:41:29 executing program 4: r0 = socket(0xa, 0x2, 0x0) bind$bt_sco(r0, &(0x7f0000000000), 0x8) [ 496.090452][ T36] audit: type=1326 audit(1622500889.843:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14699 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 496.138759][T14703] 9pnet: Insufficient options for proto=fd [ 496.320079][T14703] 9pnet: Insufficient options for proto=fd 22:41:30 executing program 2: prctl$PR_MCE_KILL(0x34, 0x400000, 0x0) [ 496.511256][ T36] audit: type=1326 audit(1622500890.263:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14693 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f61549 code=0x0 22:41:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_BG_SCAN_PERIOD={0x6}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x28, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0xc, 0x6, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x8}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x15, 0x1, @random="4a42853ad26a62c40e32b2711bda1964c0"}]}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6}, @NL80211_ATTR_SCAN_FLAGS={0x8}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1e70, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x1001, 0x2, "e062e88d5d9da5749a66a3e78e47977483145c64069f83269e0bc902292b26d19fcaccbefaa0dca7800fcb2028374bc0f18bc37b67c081f8ab0b98581579bd18e977614005f286fc5ecc606c0c449352353e113418ab1746c7a2921e95cc1a9938f536acf5154ed641c87718f812e9c26081593fa071d19fe44f2a2874164c85a170f205b117c5d74b35b50545abf1ec7abf033d9e4e744b526966ba74a7f4d091f4fb4c0077518d7ad0eb73eb66f809fccf174eda71305c4de68975f0146bf9e885b2bd64741343a9e0c6da743a225b6d0d172e1821aedf5ae8de6acc40d3c0ae58de5e9a99a2a2ba7f89ef1e6456dd67118c41f8442a1f44b56c32e30681a6226e41a51a0f65c564faa67c42b338d79acc2d3ad67c776431a5ec131d83f24b2f1f58982607bed7abea55999f75af07ac972f001748e70891cb2ee8a381b3ea95ba368c16ffb280c9c2abda1326889261b1cc22c28363cd5706bcf61f3374ed2de940bd4fa2e859a47948939b4cf86d7e86597eb6a7ce580f4b19be638cd9797873110450d859d260a7b481159b5d3522fad324a0790437515f454bd659aebe37748d4ad92854c1a2a162ae18e0d6be0791d56dad9dfdab65499e4558424535bcb0cfad64098b9ffcc7ff60a9aef9503f9d8405cd1fae974f95bfdda4326c56aa84826e5dae560664b13b905c38c0785a75b5636bbc425767858d11915c817e9f4e2544e1703bd3d508eb50ad13440d732fcf62c4f02ff6b39d5c6af70dfd7a5dd59f989d9b8baa16a3c1c62d8144bece93c4f025fc057ab23b4e0a604aaac6a848a8cdaad5da0d9a545dc505f0dcd9864a83865edf78563ead9e2aa5c79d68f44a3f29bf67f8fd33fbee4a3eb7a7f8028a4d475cd3c987656e7b72bec21d97374a44531f924f4e67da6c42f5ae4dcb053cef79c5d2d004def800cafad2b346ac843bd81726756303b2cb528f69abe3fc48a8a5f6f06e1b6434bff77a327a0eb43e3dcb83fb743e74dd6196584104a6b615ef6f1e36a970ee27ef7377f6339ac032a2351c93f6facd059b0589951fe716aec121bdd1faa870ca6bb0375108526d56c2b6dbbc4abc2853f878788a667d4db69d00b611cd89b95e7edc64190d2d9326ed34d7d733d9d67a78d0a41a686b887503b8ba4b7ae592f50d8e070042f317acf15f8ac79ebff93c2a6c6fb62812d8348aa012d4f41ec3068640cc8697ff48c7f09d95c3a5dd50e429e1dddd9e3735228415a637cc29a3200e0bce3003d7175a23744e1aaa7471ba071be76ec9ca2f674b5b9c069be11a96c310c3a899e3853bc9057877539ac78ad313f0826415f879a6fd5c7af4cd69c0a8eb860456d9cc3d05f847df4a1394acc85a4373a0f9940ebcf4725154838a8d9bc42331bb7d19c71a404778090917a3a8040fd42b5695945742af21ca48591350715e3753565ba3f99b4911939c49d37883900d0f10e342c36f54d868af05c69851bbbdbf222e1c64020942b1c950b9bf288a5d694cca172bbb53856f836e96571c03117013ef0ae360661052de96ce856ac7c7799d68cc105c1ccd1f0645874dbcc9f034c761fe796b114ea7ca27ae56345411940b2e172ab48ec4b9587aac4e20eedb58fb0cd4ba21b131e1e3cc65e63c8c13efd16adb4b487054955dafc0c5686592347212d735f53177143535775bc801a0821f2e08c227e5f0ce914766b479da8deb595f37a36665547828c8570ae6a22dfc58631a8462cb1166af81101e871d610bd743d861db86c1a0bc5ef6cf917371fdc0b90941df12187de802186ea2d6c31bd8dbd06d6e692484cefa2466e0da0a1b4f9f0448ef8cb82df7d108caf2b60b1cc44e210d466bc817dc8d675df093bf6375381d8c8339b2b29ff0402d361ebef82a7e6d4d484e4a7f3c88099ce1b122f986c1b12ca13260b8c2a8017ebdbbcf19e7f32b82ec19668948593d00c6462f6e827efefe307dded86128a68abb4e613e27311c4c018bc19d90d2f27df33b5647e1710f8c756d2b1673d8d9f3ed3dcf06067e5c3ad5100e148f99d92c341f8da40da69c7848c92695d73cbcb8284f989fcae71ea658ea8acd1e767147925778c5207be44d499d317d1b48d663d917a50513b3868ed37c7585d86a892b06f5e72b3a3f8f34fee222a2ba52220793390d5482fc820eb95665b34472d62b5e243bd8135182cecae95df2ee8fa20fece430e3e88da4fc90ced6cbc2a49a630e665604b1d20b158098bf4ca26a282b81224e3c7d3d525ed3fb42bcca4398443c0b4a148dbfd5affc691992d850d87afb180479552abb4d76b3c5fd029621850fcbcbe0fd29b69ad6c581158f0ff28fbb8306529c9fe20008722ea8281be8cf1418b7ae093f5dd79f86fa440c272a0e8105ab6a36ec5470f285bf0aac425e44bab5b66c6fd28fb956a230145916e796f6255454050c2007899671f0bd8592f10c39e3a3cee211d2341ca4e348cbc592356daf74d2f43605fe7a7e144a802e13efec06766feffecffe2712d3359830f290992a593d1174846575f657d832adea0833bc2c828abfa9f4a925f7fbaa264f05ec0f95384bf5e8341e6185ba469989b219e18947021106c8a235864dd2c3218070712e488a34e79c41387baa9939ba9ff21f0ff6867e3270ec792abfe2b13b1bff2722f05e2c441921ede88cfdb6b955053354185973aad92ee0bdcf0a60143c1be88f2f1e37fd069fdc5ea3f66de3227be77b8aba2b6539bb25ce9968481eeed311e22d768ca526e90537cc16c30bc0a3fe322ce818f6a2533d82b3aec11cff8ace9d5f9a557bd2bc2c796e9717addc2594d6d3040a5085686ed31863104d3f6e780ad5ea2e135ef5ba35b53a49b9cd8cb491e5e280ac732a91f2ed24741c50bef20cf5cb2ad4e00d3ba16c0fc564111e3d37ffda89bc4e8b0bcd9495ead63aa0d38614a13017947f77436d6cf2b8a67eb22f111c993e86659c7dcd91a972a0581ff53cce90e5833d270df1d6fdc917679bab6dd7be32c9bfe4f3cecda0cdf4ac47a20c79953888d69fbd9c950d105f57d83a73722df62d7613db772f0ca29d86e81ce1bd560379b0faa261696e6f7a921f99623a34b796c6eb7fc8cc22ee0571b865b9dd18ff617c77ef1131ad842a38e79fa10326890f407bdd87a591be24c51d535ce7358ea968513f18d433d0e8ca6bccc716352c4054d2bc886026d331e2783176b60413c3b31097ee00332566f71d814a32c2ce99593ac75ce049cabe79f6eb7d3a53733132343d344b682ed1062b61df84858077112295b854a5bb8a6573434420e21352c07cc8532687f7101d43a169257465333862bf0f32fe272656f38524472297b9057ae7fefca4985fa6cf8ee43b9e8f0d95105da621c88e6241c0d9bde15c24a8c016bd267cb8a801b0d9ca2ccb2289e1adcd9a68c3e413fd6fec1086685b61158ffcce2111b8bfbc7f0f301ef3c41ea5af374774258aefe0ebc168239722d1f9ce4296180286c2e02581aeeb380f89ebdaa636d2c36dc984515ad7fdce473fabfc2808da3e5ee6c4581935adcf920fbd8925204a79e86febd05a9aebff143bcb1db375b2f543494e195e03eba21b3ecee881a900371f21f877da4af8d6d8e8b79f9106dd20eb096ebdab23d49530f5c76fb4e7ebf56767b9a0a48afc34ff583da48a902ccf0182e01e3c46474e70677bc193942c6374c7668828198c9839d25aee6e18fa59ebccb4dbe7d867a4f495c24af7670b7218f45751b3c45a0f0f7f9c49377d6d6b86daaca079c0b3479eabb0b38eab521152f248d437ed6b5de2b70959f13a075a7c8a91af9ffd2d1fa7e1c7b20cca5fca845917db744bfeaed9475ccdbd291d72eea2577b972f40e2caeb90dec21063b8cf7a6f28c78d278170985f8b9843cbe0d3cc205c8cce4a2bc575b6bfd8a037e7e0fc6cac74fbf204d30cbfb72c8789b9e862020b6abdd51fb6aa01b79c7b42d5e449ba067e18e004a17dba45d893dbaebb4959e0167c4d1e60e729337d18ac6ede10cf8b11080a0924da5d18afccbb1fc64f32246c6ca0316140ac106013f052a23365594fb3fc4c61341b8c5981955f89dbbe830a724c4e66d22c95b5caf84324aa45abc66413ba1825c7f6872cb273a1e9fb82b39248df8f8790bedeefd11226113f1fe3bde0955bf06b2c7ce1d1d908620f8c76a013dfc216f06b18016d0682a3e08434c3454fb760e641990bc60363e300e76a59869d3de6dd6d2b634ae60051e3185555109c0772aca79be88c1b61d12b49f2f4594a0b52462d260007b0f3d03c0c6d1237a58cda04b38dfab1f0a79c7b7cdd92eeb62379bbf7fea1ac14a9c94ec4748e54f7f1b079434db57dc898c56f3cb56a51f08e8d58617caa564877409bb4b7144a955e0ce4513b58560b55a268e8c1bfd89d19e1638339fa45a48fb2208cbe576bb46c2c5d5f861309349bf14dc45c3b55188a301d9d3659b8b581815399ce024924371d72bd9c93eae44d9267f0ce9afa44b0df947cdd73221ada5a89a00dafc74837cd2b1b4e0abed395072f7c652b0c51fdd6b2fec1a94546a06feb38a503384cb21d055e83125a59d2367ec85d9c6839e479aadea8a47ddef8bb35b3abc468961cda3014ea98ced1c0adf25dd9099dae48b7263a52eefade0da9a662365d513b0214ab38682d5b843a8580db0a9a32df86538d117dedc5364abf78efc7dc41c7fe7f4778201c139bb60144e6f3b4701ee3828e3b53b06d4d4307ed36caddecc188ee18f0a5488a2a15989d2782013f0f0a14cbbcf273403707c14fdce4b3c3aca9d9998f0bc3b32e0791be8a499377225f6de4fadbc8e9ed7d56f7ccdc3d40f6954575f530120774ffda6169151c21aa0c6051efd64801c9f41c1e78f9d9a41e1e0ef844499993e86a0c7ef50caee12988e4dd8c2f3f5d6106fa617f2f62776e8518630b805709ce225ff3f5aaf2529f1fdeb2ba287b567e0318e2442c7157805fac70320a5b171ec8f33ee946f4a4f71dac990e03bcabf5e2ffccd61bba9ff89fb3e4a21b24c803411d361c034a3c1452f27fc439d634dd271b09b59f4fe9ea3f6d95261c43f128194aa6e2484e797faedced72dc6b0214ed9a199a3b045177918f292924e0ccce1f6e50df2b2328f714cf1b3ff1adf87efa52a40a3abaa7ccea0fc859b7a463e7d4823e2c6ed36ae62565d09731b8d75df7555532189e8a68d2d8b131af599181b2ec92ad362d2ece84eea7f2a0875b7fb59a8f197e5fb17fb6f1b28c472d53576b5c05df38d176be008292313e8e3d229b8a993d4d78634d56e544649f3873f95254bebdba847a029ea3b59965390c8a5075f9c2f8f41789bd919c4e4e135fa3116a09b0df26b50860f4294ea62c76f27852944b980e3cdcc549c8e719c28f40fd127c3201270c9ccf52b1a54b616b68722d56dc203c97ef32575102d6942f0714a5e367520788ce64ea4b3dcb9a22e9e44ffe52a7b0e59559def1d80bab3cc2c1e0f7f3a3d8b3992fb7c97c181fbfda78c5d0873d7d5f2a0bbf07846d4c3133037b2dafa46d992e20772145467cdaada74c720508af9a69666dddf1b445548e5e3c3b49e788bd6eea611405e21da7d4889f235c8a23efb7bc9cdf4d3b2bb1711752c1121bbe6fbc9482ada5ff87655a19bb38e993fb7d1f9799129df4f2bd44b45914e3d1c49ac2bb3adf202c8826f1504a209bfbfb7b10481498e6ac6dae0c65b1df0ede199e23ea0e8173974fdc54bf30e302898445d316583872e73915e0fff747a1fa7937c4c1a3d5f7277723963b5e91ab"}, @NL80211_BAND_5GHZ={0xe65, 0x1, "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"}]}]}, 0x3ec0}}, 0x0) 22:41:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f00000044c0)=[{&(0x7f00000011c0)="bf39f2798b78646deee2e49912d49d2fccc41cef491b7db4ba2396eaef7af990a26a46128a549e0a4e21443e4104465df1a56cb306f995fc323c6a67407042c15148935f4c15a26075ab4bb9bb41adff1e3681fecd93776b224736e83522161133d32f108d0fa245ba21465e3f1bfba287f66060241fb99fe96abda25c0243d438c486f04224cdc3bca3198040fa281a15a6e584b6dfa37a9c785b9bdb7851d0d8de", 0xa2}, {&(0x7f00000000c0)="fcb663925097a14cf45dcd893f2edcbc819f82f43c8008142d4a5a335ac74a72e46766e7e6c7052a63e2bb901b91f5bbed44f081d39a661ac14e18d1432437f17eac016ab1cc6adec7ff994308bae3ba40c64696671242af7546e5104060c1c9f7e5ad01faf46ddbc652c96bff91a03d1b07adb4184faba2421f65e0cd98046ec94c00484625497409a6bcadf3545b438f1964734a0e9446a6060cfe69969ea2d01e855f5678ecd4830959af5badcd48212898353e7d4e86bfcbc4ad554b5c89540382d2cc4b46ca24eaec10597a807098afb0f5a9b0", 0xd6}, {&(0x7f00000024c0)="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", 0x1000}, {&(0x7f0000002240)="2db614b050cabe5d20f55a1d2cc590b3c6cc8e2f0ae73a630a03a6c88c9302f0c2e8311a35908fec4283215e908832826680b10c18b00bf71431b02868ab4da2113c35049fb84a207a246ccf13b8c40e965ad32849cccdf9e1e5b97c75c015fb5f685c52e9e0e96777064a94f902ebef6b50f586ab72f74a907e47413a012ac903e66b22f8f8c37c145022c68331f1a6c669a3819a97b973c6eaa14438534ab5755e8e3779e798145d707d26be3057d5f02b9d058a919346b9b9b14ed17a33730568a01f0969c01ff463e6fe51b2d3d9fdaad1f1876d7ea23e98a67d6240fe26a9a88c5e6608590075a425efef79", 0xee}, {&(0x7f00000012c0)="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", 0xd8a}, {&(0x7f00000001c0)="e3eb7c87b0473951ef4d4e59d7943746", 0x10}], 0x6}, 0x0) [ 496.914581][ T36] audit: type=1326 audit(1622500890.663:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14699 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x2, 0x2, 0x301}, 0x14}}, 0x0) 22:41:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x6}, {0x2}, {0x6}]}) 22:41:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@ipv6_newroute={0x1c, 0x2e, 0x3acf9aa54b7daced}, 0x1c}}, 0x0) 22:41:31 executing program 5: prctl$PR_MCE_KILL(0xf, 0x400000, 0x0) [ 497.764826][ T36] audit: type=1326 audit(1622500891.513:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14727 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=@ipv4_delrule={0x1c, 0x1a, 0x901, 0x0, 0x0, {0x3}}, 0x1c}}, 0x0) 22:41:32 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 22:41:32 executing program 5: bpf$BPF_BTF_GET_NEXT_ID(0x15, 0x0, 0x0) [ 498.598123][ T36] audit: type=1326 audit(1622500892.353:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14727 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:32 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x4b67, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "8075b8549d54b9c670f118df745abf414286ae"}) 22:41:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@ipv6_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x1c}}, 0x0) 22:41:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x7}, {0x2}, {0x6}]}) 22:41:32 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000000)={'vcan0\x00', @ifru_map}) 22:41:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x0, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x28}]}) 22:41:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000001180), 0x14) [ 499.287891][T10884] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 499.376467][ T36] audit: type=1326 audit(1622500893.133:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14749 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 499.402359][T14751] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 499.410120][T14751] IPv6: NLM_F_CREATE should be set when creating new route 22:41:33 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 500.077781][T10884] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 500.206064][ T36] audit: type=1326 audit(1622500893.963:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14749 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:34 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045569, 0x0) 22:41:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x8}, {0x2}, {0x6}]}) 22:41:34 executing program 4: ioprio_set$pid(0x3, 0x0, 0x2004) 22:41:34 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x8, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x7, 0x0, 0xa0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0x38}}, 0x0) [ 500.800169][T10884] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 500.991794][ T36] audit: type=1326 audit(1622500894.743:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14770 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:34 executing program 5: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000000)) 22:41:35 executing program 4: prctl$PR_MCE_KILL(0x4, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 501.542700][T10884] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 22:41:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x17, 0x0, 0x1000000, 0xffffffe1}, 0x40) 22:41:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x0, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 501.786280][ T36] audit: type=1326 audit(1622500895.543:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14770 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:35 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) ioctl$UI_ABS_SETUP(r0, 0x40045568, 0x0) 22:41:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x9}, {0x2}, {0x6}]}) [ 502.464064][ T36] audit: type=1326 audit(1622500896.213:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14800 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 503.260032][ T36] audit: type=1326 audit(1622500897.013:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14800 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 506.074532][T10884] device hsr_slave_0 left promiscuous mode [ 506.126880][T10884] device hsr_slave_1 left promiscuous mode [ 506.185031][T10884] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 506.192822][T10884] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 506.246622][T10884] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 506.254389][T10884] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 506.326119][T10884] device bridge_slave_1 left promiscuous mode [ 506.332882][T10884] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.407238][T10884] device bridge_slave_0 left promiscuous mode [ 506.414436][T10884] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.483133][T10884] device veth1_macvtap left promiscuous mode [ 506.489913][T10884] device veth0_macvtap left promiscuous mode [ 506.530780][T10884] device veth1_vlan left promiscuous mode [ 506.536922][T10884] device veth0_vlan left promiscuous mode [ 509.562879][T10884] team0 (unregistering): Port device team_slave_1 removed [ 509.587915][T10884] team0 (unregistering): Port device team_slave_0 removed [ 509.602483][T10884] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 509.622520][T10884] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 509.695717][T10884] bond0 (unregistering): Released all slaves [ 509.860043][ T3127] ieee802154 phy0 wpan0: encryption failed: -22 [ 509.866716][ T3127] ieee802154 phy1 wpan1: encryption failed: -22 [ 510.767158][T14842] IPVS: ftp: loaded support on port[0] = 21 [ 511.012822][T14842] chnl_net:caif_netlink_parms(): no params data found [ 511.112844][T14842] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.120373][T14842] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.130208][T14842] device bridge_slave_0 entered promiscuous mode [ 511.143611][T14842] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.151895][T14842] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.161334][T14842] device bridge_slave_1 entered promiscuous mode [ 511.200522][T14842] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 511.216591][T14842] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 511.253692][T14842] team0: Port device team_slave_0 added [ 511.263715][T14842] team0: Port device team_slave_1 added [ 511.302724][T14842] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 511.309883][T14842] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 511.336371][T14842] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 511.349948][T14842] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 511.357260][T14842] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 511.383946][T14842] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 511.432308][T14842] device hsr_slave_0 entered promiscuous mode [ 511.440203][T14842] device hsr_slave_1 entered promiscuous mode [ 511.449090][T14842] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 511.457080][T14842] Cannot create hsr debugfs directory [ 511.661251][T14842] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.668539][T14842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 511.676521][T14842] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.683945][T14842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.780067][T14842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 511.807975][ T8474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 511.818807][ T8474] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.829999][ T8474] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.842110][ T8474] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 511.865848][T14842] 8021q: adding VLAN 0 to HW filter on device team0 [ 511.886189][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 511.895822][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.903260][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.924820][ T8473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 511.934758][ T8473] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.942067][ T8473] bridge0: port 2(bridge_slave_1) entered forwarding state [ 511.965528][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 511.984829][ T8473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 512.006166][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 512.016988][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 512.054154][T14842] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 512.064953][T14842] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 512.080000][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 512.089851][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 512.100698][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 512.110983][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 512.120646][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 512.130979][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 512.140584][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 512.161184][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 512.194714][ T8473] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 512.202514][ T8473] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 512.228099][T14842] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 512.326339][ T8473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 512.336556][ T8473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 512.387919][ T8473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 512.396950][ T8473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 512.408255][ T8473] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 512.418054][ T8473] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 512.433473][T14842] device veth0_vlan entered promiscuous mode [ 512.456068][T14842] device veth1_vlan entered promiscuous mode [ 512.505306][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 512.514724][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 512.523521][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 512.533326][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 512.550144][T14842] device veth0_macvtap entered promiscuous mode [ 512.565365][T14842] device veth1_macvtap entered promiscuous mode [ 512.594754][T14842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.605874][T14842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.615960][T14842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.626663][T14842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.636775][T14842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.647467][T14842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.657534][T14842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.668248][T14842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.678440][T14842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.689203][T14842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.701643][T14842] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 512.716941][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 512.726063][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 512.735372][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 512.745358][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 512.750368][ T8474] Bluetooth: hci3: command 0x0409 tx timeout [ 512.769376][T14842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.780904][T14842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.792285][T14842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.803024][T14842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.813098][T14842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.823968][T14842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.834075][T14842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.844770][T14842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.854850][T14842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.865621][T14842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.879158][T14842] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 512.889684][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 512.901020][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 513.159481][T10880] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 513.167745][T10880] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 513.179782][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 513.271787][T10880] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 513.280299][T10880] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 513.290860][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 22:41:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x8, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 22:41:47 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) 22:41:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000000000, 0x0, &(0x7f0000000200)={0x0, 0x0}) 22:41:47 executing program 5: setxattr$system_posix_acl(&(0x7f00000001c0)='.\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x3}}, 0x4, 0x0) 22:41:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x0, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0xa}, {0x2}, {0x6}]}) [ 513.565923][ T36] audit: type=1326 audit(1622500907.323:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15077 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:47 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) fork() 22:41:47 executing program 2: add_key$keyring(&(0x7f0000001a00), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000480), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 22:41:47 executing program 4: add_key$keyring(&(0x7f0000001a00), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)={0x0, "8e02ec0bb6634672c74a2992da15add325575e3c67ad683e41241c41520e00e339b2e3b8de6353e1eef3753041fc46db69726b36f12f81694f3e7330992b39bf"}, 0x48, 0xfffffffffffffffe) 22:41:48 executing program 3: setresuid(0xee00, 0xee01, 0x0) [ 514.401241][ T36] audit: type=1326 audit(1622500908.153:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15077 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:48 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0xb}, {0x2}, {0x6}]}) 22:41:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x4b32, 0x0) 22:41:48 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "8075b8549d54b9c670f118df745abf414286ae"}) [ 514.818228][ T35] Bluetooth: hci3: command 0x041b tx timeout 22:41:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=@ipv4_delrule={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x3}}, 0x1c}}, 0x0) 22:41:48 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000140)={'team_slave_1\x00', @ifru_mtu}) 22:41:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 515.193101][ T36] audit: type=1326 audit(1622500908.943:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15108 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:49 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0xc06855c8, &(0x7f0000000080)) 22:41:49 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x1, 0x2041) write$FUSE_DIRENT(r0, &(0x7f0000002100)={0x58, 0x0, 0x0, [{0x0, 0x0, 0x2, 0x0, '})'}, {0x0, 0x0, 0xa, 0x0, '/dev/vcs#\x00'}]}, 0x58) 22:41:49 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r1, 0x0, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x44, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x101}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xd46b0}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$sock_ifreq(r0, 0x8904, 0x0) 22:41:49 executing program 3: setxattr$system_posix_acl(&(0x7f00000001c0)='.\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x4}}, 0x24, 0x0) 22:41:49 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) [ 515.979001][ T36] audit: type=1326 audit(1622500909.733:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15108 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c0010000170001"], 0x1c0}}, 0x0) 22:41:50 executing program 4: r0 = socket(0x11, 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 22:41:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0xc}, {0x2}, {0x6}]}) 22:41:50 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x111841, 0x0) fallocate(r0, 0x3, 0x2, 0x3) 22:41:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x4, 0x378, 0xffffffff, 0x1d8, 0x108, 0x0, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, [], [], 'wlan1\x00', 'gre0\x00'}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@unspec=@time={{0x38}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev, [], [], 'netpci0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1}, 0x4) [ 516.717979][ T36] audit: type=1326 audit(1622500910.473:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15146 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 516.747779][T15149] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.2'. 22:41:50 executing program 2: r0 = socket$inet(0x2, 0x3, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1f) sendmmsg$unix(r1, &(0x7f0000000900)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0}], 0x1, 0x0) [ 516.894903][ T8473] Bluetooth: hci3: command 0x040f tx timeout [ 517.378606][T15159] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 22:41:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 22:41:51 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x111841, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x100000, 0x5}) 22:41:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x4, 0x378, 0xffffffff, 0x1d8, 0x108, 0x0, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, [], [], 'wlan1\x00', 'gre0\x00'}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@unspec=@time={{0x38}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev, [], [], 'netpci0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1}, 0x4) [ 517.553200][ T36] audit: type=1326 audit(1622500911.293:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15146 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=@getsa={0x28, 0x12, 0x1, 0x0, 0x0, {@in6=@private1, 0x0, 0x2, 0x6c}}, 0x28}}, 0x0) 22:41:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0xd}, {0x2}, {0x6}]}) 22:41:51 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = fcntl$dupfd(r0, 0x0, r1) connect$inet(r2, &(0x7f0000000080), 0xd) 22:41:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) 22:41:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x4, 0x378, 0xffffffff, 0x1d8, 0x108, 0x0, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, [], [], 'wlan1\x00', 'gre0\x00'}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@unspec=@time={{0x38}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev, [], [], 'netpci0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1}, 0x4) [ 518.396269][ T36] audit: type=1326 audit(1622500912.153:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x3}]}) 22:41:52 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x4a001, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 22:41:52 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xce2c0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) [ 518.984452][ T35] Bluetooth: hci3: command 0x0419 tx timeout [ 519.199251][ T36] audit: type=1326 audit(1622500912.953:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 519.464983][ T36] audit: type=1800 audit(1622500913.213:204): pid=15194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=14340 res=0 errno=0 22:41:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:53 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x111841, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x10e7}) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x281, 0x0) 22:41:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x4, 0x378, 0xffffffff, 0x1d8, 0x108, 0x0, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, [], [], 'wlan1\x00', 'gre0\x00'}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@unspec=@time={{0x38}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev, [], [], 'netpci0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1}, 0x4) 22:41:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0xe}, {0x2}, {0x6}]}) 22:41:53 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = fcntl$dupfd(r0, 0x0, r1) recvfrom$inet(r2, 0x0, 0x0, 0x40000021, 0x0, 0x0) 22:41:53 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000001180)='./file0\x00', 0x40, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/39, 0x27}], 0x1, 0xe633, 0x0) [ 519.822207][ T36] audit: type=1326 audit(1622500913.573:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15196 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:53 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) splice(r1, 0x0, r0, 0x0, 0x20000000916, 0x0) 22:41:54 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/131}], 0x1000000000000240, 0x0, 0x0) 22:41:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@allocspi={0xf8, 0x16, 0x201, 0x0, 0x0, {{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@empty}, @in=@remote}}}, 0xf8}}, 0x0) 22:41:54 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) [ 520.651652][ T36] audit: type=1326 audit(1622500914.403:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15196 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:54 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @dev}, @qipcrtr, @xdp}) [ 520.727243][T15220] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 22:41:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0xf}, {0x2}, {0x6}]}) [ 521.333428][ T36] audit: type=1326 audit(1622500915.083:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15228 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:55 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @dev}, @qipcrtr, @xdp, 0x5}) 22:41:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=@acquire={0x134, 0x17, 0x1, 0x0, 0x0, {{@in=@dev}, @in6=@rand_addr=' \x01\x00', {@in6=@private1, @in=@local}, {{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0x134}}, 0x0) 22:41:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = dup(r0) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in6=@empty}, @in6=@loopback, {@in6=@private1, @in=@local}, {{@in=@local, @in=@loopback}}}}, 0x128}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), r1) 22:41:55 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) [ 521.582292][T15233] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 521.601783][T15234] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 521.662781][T15237] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 22:41:55 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x3b5688e86c184152, r0, 0x0) 22:41:55 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x111841, 0x0) fallocate(r0, 0x3, 0x40000000002, 0x3) 22:41:55 executing program 3: syslog(0x3, &(0x7f0000000140)=""/135, 0x87) 22:41:55 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 522.186016][ T36] audit: type=1326 audit(1622500915.942:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15228 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x10}, {0x2}, {0x6}]}) 22:41:56 executing program 4: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0xc004743e, &(0x7f00000000c0)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r5, 0x3, 0x6, @broadcast}, 0x10) dup2(r1, r0) 22:41:56 executing program 5: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) splice(r1, 0x0, r0, 0x0, 0x916, 0x0) 22:41:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:56 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) splice(r0, 0x0, r1, &(0x7f0000000080), 0xfff, 0x0) 22:41:57 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000640)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0xa6}}, @qdisc_kind_options=@q_drr={0x8}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x58}}, 0x0) [ 523.609351][ T36] audit: type=1326 audit(1622500917.362:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15257 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 523.802070][T15265] device lo entered promiscuous mode 22:41:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000125301"], 0x28}}, 0x0) [ 523.946259][T15260] device lo left promiscuous mode [ 524.027256][T15284] device lo entered promiscuous mode [ 524.124520][T15260] device lo left promiscuous mode 22:41:57 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000080)=0x1c) 22:41:58 executing program 5: pselect6(0x40, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 22:41:58 executing program 4: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000180)="4c94", 0x2, 0xfffffffffffffffc) [ 524.427840][ T36] audit: type=1326 audit(1622500918.182:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15257 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:41:58 executing program 2: io_setup(0x7ff, &(0x7f0000002600)=0x0) io_submit(r0, 0x1, &(0x7f0000002840)=[0x0]) 22:41:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x11}, {0x2}, {0x6}]}) 22:41:58 executing program 3: syz_mount_image$fuse(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}}) [ 525.087399][ T36] audit: type=1326 audit(1622500918.842:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15304 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:41:58 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$invalidate(0x15, r0) [ 525.251414][T15311] fuse: Bad value for 'fd' [ 525.272796][T15311] fuse: Bad value for 'fd' 22:41:59 executing program 3: r0 = add_key$keyring(&(0x7f0000001180), &(0x7f0000001240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000001280), &(0x7f00000014c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 22:41:59 executing program 2: syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}}) 22:41:59 executing program 5: syz_open_dev$vcsu(&(0x7f0000000800), 0x0, 0x2) 22:41:59 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) [ 525.881690][T15321] fuse: Bad value for 'fd' [ 525.922304][ T36] audit: type=1326 audit(1622500919.672:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15304 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 525.949553][T15321] fuse: Bad value for 'fd' 22:41:59 executing program 3: r0 = syz_io_uring_setup(0x374, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd=r3, 0x0, 0x0, 0x0, 0x6}, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 22:41:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x12}, {0x2}, {0x6}]}) 22:41:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x0, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:00 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x1c, 0x0, 0x711, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="110700000000e0ffffff0b"], 0x1c}}, 0x0) 22:42:00 executing program 5: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x2, 0x0) 22:42:00 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) [ 526.631469][ T36] audit: type=1326 audit(1622500920.382:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15331 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:00 executing program 5: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='X', 0x1, 0xfffffffffffffffe) 22:42:00 executing program 3: syz_mount_image$fuse(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}}) 22:42:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x3c}}, 0x0) 22:42:00 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) [ 527.476551][ T36] audit: type=1326 audit(1622500921.232:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15331 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x0, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 527.633511][T15351] fuse: Bad value for 'fd' [ 527.642010][T15352] lo: Master is either lo or non-ether device [ 527.672144][T15351] fuse: Bad value for 'fd' 22:42:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x25}, {0x2}, {0x6}]}) 22:42:01 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x6, 0x0) inotify_add_watch(r0, 0x0, 0x4000004) 22:42:01 executing program 2: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000100)={&(0x7f00000000c0), 0x8}) 22:42:01 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 22:42:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x881) [ 528.159504][ T36] audit: type=1326 audit(1622500921.912:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15359 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x0, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:02 executing program 5: add_key$keyring(0x0, &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 22:42:02 executing program 2: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") openat$autofs(0xffffff9c, 0x0, 0xaa8501, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000002600815a"], 0x28}}, 0x0) recvmmsg(r2, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0, 0x0, 0x0, 0x500e0000}}], 0x344, 0x10122, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:42:02 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x40) 22:42:02 executing program 4: syz_open_dev$vcsu(&(0x7f0000000240), 0xbaf4830, 0x4cb40) [ 529.001033][ T36] audit: type=1326 audit(1622500922.752:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15359 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 529.122994][T15388] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 529.189612][T15380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:42:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x48}, {0x2}, {0x6}]}) 22:42:03 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000200)) [ 529.253493][T15380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 529.345963][T15380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 529.447212][T15380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:42:03 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f00000001c0)="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", 0x2000, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 22:42:03 executing program 3: r0 = fsopen(&(0x7f0000000080)='ramfs\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000000c0)='\x97k!\x00', 0x0, r1) [ 529.691759][ T36] audit: type=1326 audit(1622500923.442:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15393 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, 0x0, 0x0) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:03 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_async', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, 0x0) 22:42:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000002400)={{}, {0x0, @dev}, 0x0, {0x2, 0x0, @empty}, 'veth0_to_team\x00'}) 22:42:04 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/time\x00') [ 530.529330][ T36] audit: type=1326 audit(1622500924.282:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15393 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:04 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x0, 0x101900) read$FUSE(r0, 0x0, 0x0) [ 530.779514][T15388] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 530.868718][T15415] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 530.930399][T15415] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 531.024987][T15415] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 531.057268][T15415] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:42:05 executing program 2: syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0xc101) 22:42:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x4c}, {0x2}, {0x6}]}) 22:42:05 executing program 3: socketpair(0x11, 0xa, 0x300, &(0x7f0000000280)) 22:42:05 executing program 4: io_setup(0x7ff, &(0x7f0000002600)=0x0) io_submit(r0, 0x0, 0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x2]}, 0x8}) 22:42:05 executing program 5: setrlimit(0x0, &(0x7f0000000000)={0x8}) [ 531.522015][ T36] audit: type=1326 audit(1622500925.272:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15430 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, 0x0, 0x0) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:05 executing program 3: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x80000000) keyctl$search(0xa, r0, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 22:42:05 executing program 4: syz_open_dev$vcsu(&(0x7f0000000040), 0x9, 0x0) 22:42:05 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}}) 22:42:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xa4(Q\x80Fy\xb5\xe4q\xc9\xff \xd8\x9d\xad\x11B\x84\xb6\x1e\x835F\xef\x19\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\xb8\xfe4\xda\x80e\x94az\x04\xf1k\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f\x1f\xc2e/\x8d\x1e\n\xd0_\xbd!^\xa46\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8', 0x0) write$binfmt_elf32(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300b3000000000028002400b3d7c52ebf31a8d5c8c3c6cb00000009e500d5ffffffffffffff03000000110000000d6039017088d7c27f000000a9030001007ea85ca6574e9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 22:42:06 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x6000, 0x0) [ 532.355783][ T36] audit: type=1326 audit(1622500926.112:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15430 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:06 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x2a, 0x3, 0x0, {0x0, 0x9, 0x0, '/dev/bsg\x00'}}, 0x2a) 22:42:06 executing program 5: syz_open_dev$vcsu(&(0x7f0000000000), 0x5, 0x8380) 22:42:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x68}, {0x2}, {0x6}]}) 22:42:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000002080)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000020c0)=0x10) 22:42:06 executing program 3: io_setup(0x3f, &(0x7f0000001680)=0x0) io_submit(r0, 0x1, &(0x7f0000001900)=[&(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_submit(r0, 0x1, &(0x7f0000000700)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x5, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 22:42:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private}, {0x0, @dev}, 0x20, {0x2, 0x0, @multicast2}, 'lo\x00'}) [ 533.181173][ T36] audit: type=1326 audit(1622500926.933:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15465 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, 0x0, 0x0) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:07 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f00000000c0)=@secondary) 22:42:07 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x0, r1}, 0x18) 22:42:07 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x23, 0x0, 0x0) 22:42:07 executing program 3: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x18, &(0x7f00000002c0)=ANY=[]) 22:42:07 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r1, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, &(0x7f0000000340)={0x0, ""/65}, 0x49, 0x0, 0x2000) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) [ 534.010405][ T36] audit: type=1326 audit(1622500927.763:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15465 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:07 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x0}, 0xfffffffffffffff9) 22:42:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x6c}, {0x2}, {0x6}]}) 22:42:08 executing program 4: io_setup(0x1000, &(0x7f0000000040)=0x0) io_pgetevents(r0, 0x5, 0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], 0x0, 0x0) 22:42:08 executing program 3: io_setup(0xfffff04e, &(0x7f0000000040)) [ 534.758390][ T36] audit: type=1326 audit(1622500928.513:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15496 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:08 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, r0, 0x0) keyctl$set_timeout(0xf, r0, 0x0) 22:42:09 executing program 3: io_uring_setup(0x4d81, &(0x7f0000000040)={0x0, 0x0, 0x8}) 22:42:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:09 executing program 2: mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 535.579243][ T36] audit: type=1326 audit(1622500929.333:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15496 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:09 executing program 5: syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}]}}) 22:42:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x74}, {0x2}, {0x6}]}) 22:42:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0xd9, &(0x7f0000000200)=""/217, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:42:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)={0x0}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000024c0)={0x0}}, 0x0) [ 536.137067][ T36] audit: type=1326 audit(1622500929.893:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15519 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:10 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x2, 0x970000, 0x0) [ 536.263974][T15525] fuse: Bad value for 'fd' [ 536.283001][T15525] fuse: Bad value for 'fd' 22:42:10 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) 22:42:10 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000880)='ns/cgroup\x00') 22:42:10 executing program 5: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x7ff}, &(0x7f0000000100), &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x3]}, 0x8}) 22:42:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:10 executing program 2: setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x108) socketpair(0x0, 0x0, 0x0, &(0x7f0000000c00)) [ 536.966242][ T36] audit: type=1326 audit(1622500930.723:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15519 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x7a}, {0x2}, {0x6}]}) 22:42:11 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 22:42:11 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x10000, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000001a40)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f0000003a80)={0x2020}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0x0, r2}, 0x18) 22:42:11 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xb, r0, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) [ 537.604243][ T36] audit: type=1326 audit(1622500931.353:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15547 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f0000000200)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000280)='syzkaller\x00', 0x3, 0xd8, &(0x7f00000002c0)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:42:11 executing program 4: syz_mount_image$fuse(0x0, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:42:11 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x10000, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000001a40)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f0000003a80)={0x2020}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0x0, r2}, 0x18) 22:42:11 executing program 5: io_setup(0x3f, &(0x7f0000001680)=0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000f40)='/sys/class/ata_device', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) [ 538.440937][ T36] audit: type=1326 audit(1622500932.194:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15547 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:12 executing program 2: io_setup(0x3f, &(0x7f0000001680)=0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') io_submit(r0, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 22:42:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) 22:42:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c}, {0x2}, {0x6}]}) 22:42:12 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x10000, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000001a40)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f0000003a80)={0x2020}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0x0, r2}, 0x18) 22:42:12 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0x200801, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r0}, 0x8) [ 539.049235][ T36] audit: type=1326 audit(1622500932.804:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15573 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:13 executing program 2: socketpair(0xa, 0x0, 0x0, &(0x7f0000000280)) 22:42:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x0, 0x800, 0x1}, 0x40) 22:42:13 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, 0x0, 0x0) 22:42:13 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x10000, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000001a40)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f0000003a80)={0x2020}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0x0, r2}, 0x18) [ 539.870311][ T36] audit: type=1326 audit(1622500933.624:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15573 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:42:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x2}, {0x2}, {0x6}]}) 22:42:13 executing program 5: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) 22:42:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:14 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x181101) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10}, 0x10) 22:42:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0xd9, &(0x7f0000000200)=""/217, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 540.460259][ T36] audit: type=1326 audit(1622500934.214:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15603 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:14 executing program 4: io_uring_setup(0x6b31, &(0x7f0000000000)={0x0, 0x0, 0x4}) 22:42:14 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000000040)) 22:42:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x0, 0x0, 0xc575, 0x1008, 0x1}, 0x40) 22:42:14 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0) [ 541.293403][ T36] audit: type=1326 audit(1622500935.044:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15603 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:15 executing program 4: io_getevents(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}) 22:42:15 executing program 5: syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x9801, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}}) 22:42:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x3}, {0x2}, {0x6}]}) 22:42:15 executing program 3: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$unlink(0x9, r1, r1) 22:42:15 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f00000001c0)="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", 0x2000, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 22:42:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 541.939369][ T36] audit: type=1326 audit(1622500935.694:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15630 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:15 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, 0x0, 0x1) 22:42:15 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r0, &(0x7f0000000240)={0x18, 0xfffffffffffffff5, r1}, 0x18) 22:42:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, 0x0, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:42:16 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x2a, 0x0, 0x0) [ 542.741380][ T36] audit: type=1326 audit(1622500936.494:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15630 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:16 executing program 5: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000080)) 22:42:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x0) 22:42:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x4}, {0x2}, {0x6}]}) 22:42:16 executing program 3: prctl$PR_GET_SPECULATION_CTRL(0x28, 0x0, 0x0) 22:42:16 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 22:42:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 543.576112][ T36] audit: type=1326 audit(1622500937.334:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15658 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:17 executing program 5: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000100)="7f4b", 0x2, 0xfffffffffffffffb) 22:42:17 executing program 4: io_setup(0x3f, &(0x7f0000001680)=0x0) io_submit(r0, 0x1, &(0x7f0000001900)=[&(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_submit(r0, 0x1, &(0x7f0000000700)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x8000, 0x0, 0x2}]) 22:42:17 executing program 3: io_setup(0x4, &(0x7f0000000000)=0x0) r1 = epoll_create1(0x0) r2 = eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001a00)=[&(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 22:42:17 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x102) write$FUSE_DIRENT(r0, 0x0, 0xeffdffff) [ 544.391831][ T36] audit: type=1326 audit(1622500938.145:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15658 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x5}, {0x2}, {0x6}]}) 22:42:18 executing program 5: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0), 0x8}) 22:42:18 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, 0x0, 0x2c) 22:42:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(0x0, 0x0) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:18 executing program 3: io_setup(0x7, &(0x7f0000000180)=0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 22:42:18 executing program 2: syz_open_dev$vcsu(&(0x7f0000000000), 0x6, 0x24000) [ 545.071095][ T36] audit: type=1326 audit(1622500938.825:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15683 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:18 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0xee01, 0xee00) 22:42:19 executing program 4: io_setup(0x7ff, &(0x7f0000002600)=0x0) io_submit(r0, 0x0, 0x0) 22:42:19 executing program 2: io_uring_setup(0x40a6, &(0x7f0000000140)={0x0, 0x0, 0x20}) 22:42:19 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_wait(r1, &(0x7f00000000c0)=[{}], 0x1, 0x0) [ 545.887438][ T36] audit: type=1326 audit(1622500939.645:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15683 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:19 executing program 5: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 22:42:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x6}, {0x2}, {0x6}]}) 22:42:20 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000000)={0xa0, 0x0, r1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xee00, 0xffffffffffffffff}}}}, 0xa0) [ 546.369926][ T36] audit: type=1326 audit(1622500940.125:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15704 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=40000003 syscall=403 compat=1 ip=0xf7f3f549 code=0x0 22:42:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(0x0, 0x0) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 546.470055][ T36] audit: type=1326 audit(1622500940.225:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15706 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:20 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x102) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10}, 0x10) read$FUSE(r0, &(0x7f00000023c0)={0x2020}, 0x2020) 22:42:20 executing program 5: syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0xe0000) 22:42:20 executing program 4: io_setup(0xe59, &(0x7f0000000000)=0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) io_submit(r0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, r1, 0x0, 0x0, 0x6}]) 22:42:20 executing program 2: io_setup(0x3f, &(0x7f0000001680)) io_setup(0x0, &(0x7f0000002600)) io_setup(0x7ff, &(0x7f0000000080)) [ 547.224374][ T36] audit: type=1326 audit(1622500940.975:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15704 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=40000003 syscall=403 compat=1 ip=0xf7f3f549 code=0x0 [ 547.372554][ T36] audit: type=1326 audit(1622500941.045:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15706 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4}, 0x40) 22:42:21 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) 22:42:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x7}, {0x2}, {0x6}]}) 22:42:21 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="110700000000e0ffffff0b"], 0x1c}}, 0x0) 22:42:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(0x0, 0x0) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 547.984982][ T36] audit: type=1326 audit(1622500941.735:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15737 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:21 executing program 5: pselect6(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x3]}, 0x8}) 22:42:21 executing program 3: syz_open_dev$vcsu(&(0x7f0000000240), 0x0, 0x0) 22:42:22 executing program 4: pselect6(0x0, 0x0, &(0x7f0000000180), &(0x7f0000003b40), &(0x7f0000003b80)={0x0, 0x3938700}, &(0x7f0000003c00)={&(0x7f0000003bc0)={[0x5]}, 0x8}) 22:42:22 executing program 2: socketpair(0x11, 0xa, 0xa0, &(0x7f0000000280)) [ 548.817826][ T36] audit: type=1326 audit(1622500942.575:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15737 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:22 executing program 3: syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x210000) 22:42:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x8}, {0x2}, {0x6}]}) 22:42:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=@newqdisc={0x24, 0x24, 0x1}, 0x24}}, 0x0) 22:42:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(0x0, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:23 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xa4(Q\x80Fy\xb5\xe4q\xc9\xff \xd8\x9d\xad\x11B\x84\xb6\x1e\x835F\xef\x19\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\xb8\xfe4\xda\x80e\x94az\x04\xf1k\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f\x1f\xc2e/\x8d\x1e\n\xd0_\xbd!^\xa46\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8', 0x0) write$binfmt_elf32(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300b3000000000028002400b3d7c52ebf31a8d5c8c3c6cb00000009e500d5ffffffffffffff03000000110000000d6039017088d7c27f000000a9030001007ea85ca6574e9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 22:42:23 executing program 5: syz_mount_image$fuse(&(0x7f0000002440), &(0x7f0000002480)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000, &(0x7f0000002680)=ANY=[]) [ 549.523266][ T36] audit: type=1326 audit(1622500943.275:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15764 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:23 executing program 3: io_setup(0x7ff, &(0x7f0000002600)=0x0) io_submit(r0, 0x0, 0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) 22:42:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000740), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x24, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x24}}, 0x0) 22:42:23 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/class/ata_device', 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000f40)='/sys/class/ata_device', 0x0, 0x0) 22:42:24 executing program 3: syz_open_dev$vcsu(&(0x7f0000000800), 0x100000000, 0x0) 22:42:24 executing program 5: prctl$PR_GET_SPECULATION_CTRL(0x4, 0x0, 0x0) [ 550.358824][ T36] audit: type=1326 audit(1622500944.116:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15764 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x102) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10}, 0xfffffdef) 22:42:24 executing program 4: r0 = add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='+', 0x1, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r1) 22:42:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x9}, {0x2}, {0x6}]}) 22:42:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(0x0, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r1, 0x0) 22:42:24 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="110700000000e0ffffff0b"], 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, 0x0, 0x0, 0x0, 0x0) 22:42:24 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$read(0xb, r0, &(0x7f0000000180)=""/249, 0xf9) 22:42:25 executing program 4: clock_gettime(0x1, &(0x7f0000000100)) [ 551.258600][ T36] audit: type=1326 audit(1622500945.016:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15799 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:25 executing program 3: r0 = add_key(&(0x7f0000001340)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="fc", 0x1, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) 22:42:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020101000240008000f8", 0x16}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000003c0)={[{@fat=@usefree}]}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004103) 22:42:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) 22:42:25 executing program 4: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0xba2ce2f21f952ad5}, 0x10) [ 552.079904][ T36] audit: type=1326 audit(1622500945.836:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15799 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(0x0, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xa}, {0x2}, {0x6}]}) [ 552.383567][T15824] loop5: detected capacity change from 0 to 6 [ 552.402307][T15824] FAT-fs (loop5): bogus number of FAT sectors [ 552.408727][T15824] FAT-fs (loop5): Can't find a valid FAT filesystem 22:42:26 executing program 3: r0 = add_key(&(0x7f0000001340)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="fc", 0x1, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) [ 552.543360][T15831] loop5: detected capacity change from 0 to 6 [ 552.596841][T15831] FAT-fs (loop5): bogus number of FAT sectors [ 552.603191][T15831] FAT-fs (loop5): Can't find a valid FAT filesystem 22:42:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x3}, 0x40) 22:42:26 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x67, 0x0, 0x0) 22:42:26 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x0) read$FUSE(r0, &(0x7f0000001a40)={0x2020}, 0x2020) [ 553.024377][ T36] audit: type=1326 audit(1622500946.776:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15844 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:26 executing program 3: r0 = add_key(&(0x7f0000001340)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="fc", 0x1, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) 22:42:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000500), 0xffffffffffffffff) 22:42:27 executing program 2: keyctl$instantiate_iov(0x7, 0x0, 0x0, 0x0, 0x0) 22:42:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x0, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:27 executing program 3: r0 = add_key(&(0x7f0000001340)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="fc", 0x1, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) 22:42:27 executing program 5: setrlimit(0x1, &(0x7f0000000000)) [ 553.867048][ T36] audit: type=1326 audit(1622500947.626:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15844 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xb}, {0x2}, {0x6}]}) 22:42:27 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0x10) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 22:42:28 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) io_setup(0x3f, &(0x7f0000001680)) 22:42:28 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000008c0)='/sys/module/xhci_hcd', 0x280800, 0x0) 22:42:28 executing program 5: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") openat$autofs(0xffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000002600815a"], 0x28}}, 0x0) recvmmsg(r2, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0, 0x0, 0x0, 0x500e0000}}], 0xaa, 0x10122, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 554.549893][ T36] audit: type=1326 audit(1622500948.306:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15873 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:28 executing program 4: io_setup(0x1000, &(0x7f0000000040)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:42:28 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) io_setup(0x3f, &(0x7f0000001680)) socket$inet(0x2, 0x0, 0x8100) 22:42:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x0, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 555.179884][T15888] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 555.211620][T15883] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 555.248836][T15883] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 22:42:29 executing program 3: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) [ 555.310220][T15883] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 555.358081][ T36] audit: type=1326 audit(1622500949.116:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15873 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:29 executing program 4: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) [ 555.418801][T15883] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 22:42:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xc}, {0x2}, {0x6}]}) [ 556.110302][ T36] audit: type=1326 audit(1622500949.866:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15904 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:29 executing program 3: add_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 22:42:29 executing program 4: epoll_wait(0xffffffffffffffff, &(0x7f00000006c0)=[{}], 0x1, 0x0) 22:42:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$inet(r0, 0x0, 0x0, 0x0) [ 556.651974][T15888] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 556.710514][T15917] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 22:42:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x0, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:30 executing program 3: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000002400), &(0x7f0000002440)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, 0x0, 0x0) [ 556.933053][ T36] audit: type=1326 audit(1622500950.687:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15904 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 557.428225][T15917] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 557.471333][T15917] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 557.514946][T15917] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 22:42:31 executing program 5: socketpair(0x26, 0x0, 0x0, &(0x7f0000000200)) 22:42:31 executing program 4: syz_open_dev$vcsu(&(0x7f0000000240), 0x0, 0x4cb40) 22:42:31 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) 22:42:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xd}, {0x2}, {0x6}]}) 22:42:31 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x141dc2, 0x0) [ 557.758389][ T36] audit: type=1326 audit(1622500951.497:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:31 executing program 4: perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8500) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 22:42:31 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0xee00) 22:42:31 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000008c0)='/sys/module/xhci_hcd', 0x0, 0x0) 22:42:32 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000000)={0xa0, 0x0, r1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xffffffffffffffff}}}}, 0xa0) 22:42:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 558.589437][ T36] audit: type=1326 audit(1622500952.337:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:32 executing program 4: perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8500) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 22:42:32 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000f40)='/sys/class/ata_device', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xb, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 22:42:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xe}, {0x2}, {0x6}]}) 22:42:32 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)) 22:42:32 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$invalidate(0x15, r0) keyctl$set_timeout(0xf, r0, 0x0) [ 559.309314][ T36] audit: type=1326 audit(1622500953.057:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15966 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:33 executing program 2: add_key$keyring(&(0x7f0000001180), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000001280), &(0x7f00000014c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 22:42:33 executing program 4: perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8500) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 22:42:33 executing program 3: mount$fuseblk(0x0, 0x0, 0x0, 0xf727adc94bde7599, 0x0) 22:42:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) 22:42:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 560.134431][ T36] audit: type=1326 audit(1622500953.877:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15966 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:33 executing program 3: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x6}, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x3]}, 0x8}) 22:42:33 executing program 2: prlimit64(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000040)) 22:42:34 executing program 4: perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8500) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 22:42:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xf}, {0x2}, {0x6}]}) 22:42:34 executing program 5: io_setup(0x7ff, &(0x7f0000002600)) io_setup(0x0, &(0x7f0000002600)) [ 560.701881][ T36] audit: type=1326 audit(1622500954.447:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15992 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:34 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xa4(Q\x80Fy\xb5\xe4q\xc9\xff \xd8\x9d\xad\x11B\x84\xb6\x1e\x835F\xef\x19\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\xb8\xfe4\xda\x80e\x94az\x04\xf1k\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f\x1f\xc2e/\x8d\x1e\n\xd0_\xbd!^\xa46\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8', 0x0) write$binfmt_elf32(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300b3000000000028002400b3d7c52ebf31a8d5c8c3c6cb00000009e500d5ffffffffffffff03000000110000000d6039017088d7c27f000000a9030001007ea85ca6574e9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 22:42:35 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x2, &(0x7f00000000c0)=@raw=[@map], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x78) 22:42:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:35 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000003b80)={0x0, 0x3938700}, 0x0) [ 561.530745][ T36] audit: type=1326 audit(1622500955.277:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15992 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:35 executing program 2: io_setup(0x3f, &(0x7f0000001680)=0x0) io_submit(r0, 0x1, &(0x7f0000001900)=[&(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 22:42:35 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x2, 0x0, 0x0) 22:42:35 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) socket(0x0, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000008c0)='/sys/module/xhci_hcd', 0x0, 0x310) 22:42:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x10}, {0x2}, {0x6}]}) [ 562.086839][ T36] audit: type=1326 audit(1622500955.837:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16019 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:36 executing program 2: keyctl$instantiate_iov(0xe, 0x0, 0x0, 0x0, 0x0) 22:42:36 executing program 5: r0 = eventfd2(0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, 0x0) 22:42:36 executing program 4: syz_mount_image$fuse(&(0x7f0000004240), &(0x7f0000004280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000042c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 22:42:36 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) [ 562.776967][T16034] fuse: Bad value for 'fd' [ 562.789748][T16034] fuse: Bad value for 'fd' 22:42:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:36 executing program 2: ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000040)=ANY=[@ANYBLOB="02"]) io_setup(0x0, &(0x7f0000000040)) [ 562.917569][ T36] audit: type=1326 audit(1622500956.667:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16019 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:36 executing program 5: keyctl$set_timeout(0xf, 0x0, 0x80000000) add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x2000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 22:42:36 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x482) write$FUSE_IOCTL(r0, &(0x7f0000000100)={0x20}, 0x20) 22:42:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x11}, {0x2}, {0x6}]}) 22:42:37 executing program 3: syz_mount_image$fuse(&(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}}) 22:42:37 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000006c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f0000000500)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$update(0xe, r2, 0x0, 0x0) [ 563.531801][ T36] audit: type=1326 audit(1622500957.278:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16050 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:37 executing program 5: r0 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="fc", 0x1, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$unlink(0x9, r2, r0) 22:42:37 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2c0000000300000000000000000000000300000000000b000000003a"], 0x2c) 22:42:37 executing program 3: syz_mount_image$fuse(&(0x7f0000002440), &(0x7f0000002480)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 22:42:37 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000002100), 0x220000, 0x0) 22:42:38 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$link(0x8, r0, r0) [ 564.340684][T16069] fuse: Bad value for 'fd' [ 564.369993][ T36] audit: type=1326 audit(1622500958.118:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16050 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 564.378306][T16069] fuse: Bad value for 'fd' 22:42:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:38 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x493086, 0x0) 22:42:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x12}, {0x2}, {0x6}]}) 22:42:38 executing program 3: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000002400), &(0x7f0000002440)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000002480)=""/194, 0xc2) 22:42:38 executing program 2: add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='+', 0x1, 0xfffffffffffffffb) 22:42:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x1, &(0x7f00000005c0)=@raw=[@ldst={0x2}], &(0x7f0000000600)='GPL\x00', 0x2, 0xaf, &(0x7f0000000640)=""/175, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 565.129063][ T36] audit: type=1326 audit(1622500958.878:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16079 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:39 executing program 3: sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, &(0x7f0000001e40)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000001ec0)) 22:42:39 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x10000, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000001a40)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0x0, r2}, 0x18) 22:42:39 executing program 2: io_setup(0x3f, &(0x7f0000001680)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000f40)='/sys/class/ata_device', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000640)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) 22:42:39 executing program 5: add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c8", 0x1, 0xffffffffffffffff) 22:42:39 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) [ 565.964910][ T36] audit: type=1326 audit(1622500959.718:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16079 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:39 executing program 4: io_setup(0x1000, &(0x7f0000000040)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x0) 22:42:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:40 executing program 2: io_setup(0xe59, &(0x7f0000000000)=0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) io_submit(r0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, r1, &(0x7f0000000040)}]) 22:42:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x25}, {0x2}, {0x6}]}) 22:42:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 22:42:40 executing program 3: write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) [ 566.597186][ T36] audit: type=1326 audit(1622500960.348:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16112 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:40 executing program 4: timer_create(0x0, &(0x7f00000022c0)={0x0, 0x0, 0x4}, 0x0) 22:42:40 executing program 2: r0 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="fc", 0x1, 0xfffffffffffffffb) keyctl$update(0x2, r0, &(0x7f0000000000)='A', 0x1) 22:42:40 executing program 5: syz_open_dev$vcsu(&(0x7f0000000740), 0x0, 0x0) 22:42:40 executing program 3: prctl$PR_GET_SPECULATION_CTRL(0x2, 0xd04f00, 0x0) 22:42:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000001ec0)) [ 567.439481][ T36] audit: type=1326 audit(1622500961.188:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16112 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:41 executing program 5: openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:42:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x48}, {0x2}, {0x6}]}) 22:42:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, 0x0) getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:41 executing program 2: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000180)='L', 0x1, 0xfffffffffffffffc) 22:42:41 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000200)) 22:42:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04"], 0x40}}, 0x0) [ 568.170304][ T36] audit: type=1326 audit(1622500961.918:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16141 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:42 executing program 5: socketpair(0x28, 0x0, 0x4, &(0x7f0000000000)) 22:42:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xe05, 0xffffffffffffffff, 0x7ff}, 0x40) 22:42:42 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x240, 0x0) 22:42:42 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$update(0x2, 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0xee01, 0xee01) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$invalidate(0x15, r0) 22:42:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, r0) keyctl$revoke(0x3, r0) [ 568.987680][ T36] audit: type=1326 audit(1622500962.738:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16141 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:42 executing program 2: syz_mount_image$fuse(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1002, &(0x7f0000000700)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}}) 22:42:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x4c}, {0x2}, {0x6}]}) 22:42:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 22:42:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, 0x0) getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:43 executing program 4: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000040)) 22:42:43 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x10000, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000001a40)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0x0, r2}, 0x18) 22:42:43 executing program 5: syz_open_dev$vcsu(&(0x7f00000001c0), 0x7f, 0x82240) [ 569.719024][ T36] audit: type=1326 audit(1622500963.468:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16172 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:43 executing program 3: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) 22:42:43 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 22:42:44 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x7, 0x102) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10}, 0x10) 22:42:44 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 570.501266][ T36] audit: type=1326 audit(1622500964.249:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16172 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:44 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r1, 0x80000000) keyctl$search(0xa, r1, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, r0) 22:42:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x60}, {0x2}, {0x6}]}) 22:42:44 executing program 4: io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 22:42:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, 0x0) getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:44 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x16, 0x0, 0x0) 22:42:44 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x0) io_setup(0x6, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000001cc0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x6}]) [ 571.244581][ T36] audit: type=1326 audit(1622500964.989:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16205 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:45 executing program 3: syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x200) [ 571.300910][ T3127] ieee802154 phy0 wpan0: encryption failed: -22 [ 571.307596][ T3127] ieee802154 phy1 wpan1: encryption failed: -22 22:42:45 executing program 4: io_setup(0x3f, &(0x7f0000001680)) io_setup(0x7ff, &(0x7f0000002600)) 22:42:45 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xb, r0, &(0x7f0000000100)='keyring\x00', 0x0, 0x0) 22:42:45 executing program 3: prctl$PR_GET_SPECULATION_CTRL(0x17, 0x0, 0x0) 22:42:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 572.100667][ T36] audit: type=1326 audit(1622500965.849:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16205 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:45 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r1, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, &(0x7f0000000340)={0x0, ""/65}, 0x49, 0x0, 0x2000) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) 22:42:45 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000003a80)={0x2020}, 0x2020) 22:42:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x68}, {0x2}, {0x6}]}) 22:42:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:46 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x502) write$FUSE_DIRENT(r0, &(0x7f0000000000)=ANY=[], 0x138) [ 572.768479][ T36] audit: type=1326 audit(1622500966.509:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16235 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:46 executing program 2: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x7ff}, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x3]}, 0x8}) 22:42:46 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x10001) 22:42:46 executing program 5: io_setup(0x3f, &(0x7f0000001680)=0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_submit(r0, 0x1, &(0x7f0000000700)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x8000, 0x0, 0x2}]) 22:42:47 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000000)={0xa0, 0x0, r1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xffffffffffffffff, 0x5}}}}, 0xa0) 22:42:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000540), 0x4) 22:42:47 executing program 2: munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 573.587363][ T36] audit: type=1326 audit(1622500967.339:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16235 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:47 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r1) 22:42:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x6c}, {0x2}, {0x6}]}) 22:42:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:47 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002180)='./cgroup/syz1\x00', 0x200002, 0x0) 22:42:47 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) [ 574.216052][ T36] audit: type=1326 audit(1622500967.969:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16266 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:48 executing program 4: socketpair(0x33, 0x0, 0x0, &(0x7f0000000240)) 22:42:48 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x4101) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[], 0x10) 22:42:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 22:42:48 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x102) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10}, 0x8800000) 22:42:48 executing program 5: sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000f40)='/sys/class/ata_device', 0x0, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, 0x0, 0x0) 22:42:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 22:42:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x74}, {0x2}, {0x6}]}) 22:42:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 22:42:49 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83604, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0x6, 0x1600}], 0x81, &(0x7f0000000180)) [ 575.765790][ T36] audit: type=1326 audit(1622500969.519:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16295 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:49 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) [ 576.326843][T16309] loop5: detected capacity change from 0 to 1051 22:42:50 executing program 3: prctl$PR_GET_SPECULATION_CTRL(0x39, 0x0, 0x0) [ 576.412164][T16309] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 576.449644][T16309] EXT4-fs (loop5): orphan cleanup on readonly fs [ 576.456896][T16309] EXT4-fs error (device loop5): ext4_free_inode:282: comm syz-executor.5: reserved or nonexistent inode 3 [ 576.468830][T16309] EXT4-fs warning (device loop5): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 576.483167][T16309] EXT4-fs (loop5): Cannot turn on quotas: error -22 [ 576.490282][T16309] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 576.598225][ T36] audit: type=1326 audit(1622500970.349:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16295 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:50 executing program 2: mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x314f2, &(0x7f0000002400)) 22:42:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x7a}, {0x2}, {0x6}]}) 22:42:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, 0x0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:50 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f00000021c0), 0xffffffffffffffff) 22:42:50 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x1e, 0x0, 0x0) 22:42:50 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83604, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0x6, 0x1600}], 0x81, &(0x7f0000000180)) [ 577.322452][ T36] audit: type=1326 audit(1622500971.070:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16319 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:51 executing program 2: io_setup(0x4, &(0x7f0000000000)=0x0) r1 = epoll_create1(0x0) io_submit(r0, 0x1, &(0x7f0000001a00)=[&(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}]) 22:42:51 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000300)={&(0x7f00000000c0)="8e42973e9ce513aa8676b8dbe19eee79d6571f7b767bef356f141772c55cf779fe26e7a9fae2b29f2ab51ef71e81ae944429c914c9e14a92447c20b1fffe6d4c122d9e44272b60e55a7cd52b9ac19c", &(0x7f0000000180)=""/70, &(0x7f0000000000)="3a3fb22023ce916ef87fb82a14cd86240a14b6cd3aa31abec9e9d71588c0a186302eda42", &(0x7f0000000200)="e4fafbdd01b2e3738c97af95b6d1e66317dcfcf07d9bcca79af264f0f23daef9a41edaa212fb15661c30175a5548dfc6d199392232f8c79265b023caac3b01fe9409120248c8b4fb3888f1e704e1f9241fb508bd8485994d67d81688b7894d075efa605dfdcd4822a2b6e6e02e5e03a132b3109c2724b26fbc5df2ba6aeee6e5fbb05fb1c9c3aed2aa8d4a54ae0583717917c3b08540c7cd471da4a7fd1dde3a0a79265798515e6fc0872f139f319e802db6c13d8267ebf0af3ee47d0db743498d0301f4f0c12b5ebaa92fab85867c4200", 0x400}, 0xfffffe31) 22:42:51 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000f40)='/sys/class/ata_device', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000340), 0x2, 0x0) [ 577.958474][T16337] loop5: detected capacity change from 0 to 1051 [ 577.981575][T16337] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 577.999398][T16337] EXT4-fs (loop5): orphan cleanup on readonly fs [ 578.006329][T16337] EXT4-fs error (device loop5): ext4_free_inode:282: comm syz-executor.5: reserved or nonexistent inode 3 [ 578.018318][T16337] EXT4-fs warning (device loop5): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 578.033458][T16337] EXT4-fs (loop5): Cannot turn on quotas: error -22 [ 578.040387][T16337] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 578.136383][ T36] audit: type=1326 audit(1622500971.890:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16319 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xc0}, {0x2}, {0x6}]}) 22:42:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, 0x0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:52 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83604, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0x6, 0x1600}], 0x81, &(0x7f0000000180)) 22:42:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000020c0)) 22:42:52 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) timerfd_gettime(r0, 0x0) 22:42:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000740), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002cbd7000fddbdf250f00000008003c000901000005002900010000000500ae0000000000050033000100000008002b0001000000050030000000000008000300", @ANYRES32=r4], 0x54}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x24, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x24}}, 0x0) [ 578.926279][ T36] audit: type=1326 audit(1622500972.680:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16353 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 579.288882][T16362] loop5: detected capacity change from 0 to 1051 [ 579.329577][T16362] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 579.353942][T16362] EXT4-fs (loop5): orphan cleanup on readonly fs [ 579.360774][T16362] EXT4-fs error (device loop5): ext4_free_inode:282: comm syz-executor.5: reserved or nonexistent inode 3 22:42:53 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000240)={0x18}, 0xfffffffffffffe4c) [ 579.372623][T16362] EXT4-fs warning (device loop5): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 579.386900][T16362] EXT4-fs (loop5): Cannot turn on quotas: error -22 [ 579.393624][T16362] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 22:42:53 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x0) [ 579.734712][ T36] audit: type=1326 audit(1622500973.480:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16353 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:53 executing program 3: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) io_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) 22:42:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83604, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0x6, 0x1600}], 0x81, &(0x7f0000000180)) 22:42:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xe0}, {0x2}, {0x6}]}) 22:42:53 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 22:42:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, 0x0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:54 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x1c, 0x0, 0x0) [ 580.383653][ T36] audit: type=1326 audit(1622500974.130:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16380 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:54 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0xfffffffffffffffd) [ 580.608345][T16388] loop5: detected capacity change from 0 to 1051 [ 580.789850][T16388] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 580.874845][T16388] EXT4-fs (loop5): orphan cleanup on readonly fs [ 580.881562][T16388] EXT4-fs error (device loop5): ext4_free_inode:282: comm syz-executor.5: reserved or nonexistent inode 3 [ 580.893416][T16388] EXT4-fs warning (device loop5): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 580.908529][T16388] EXT4-fs (loop5): Cannot turn on quotas: error -22 [ 580.915426][T16388] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 22:42:54 executing program 3: statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 581.202915][ T36] audit: type=1326 audit(1622500974.950:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16380 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 22:42:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x300}, {0x2}, {0x6}]}) 22:42:55 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 22:42:55 executing program 5: io_setup(0x3f, &(0x7f0000001680)) getrusage(0x1, &(0x7f0000000000)) 22:42:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:55 executing program 3: keyctl$clear(0x7, 0xfffffffffffffff8) [ 581.986296][ T36] audit: type=1326 audit(1622500975.730:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:55 executing program 2: r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f00000000c0), 0x8) 22:42:55 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000240)={0x18}, 0x2000008c) 22:42:55 executing program 4: socketpair(0x10, 0x3, 0x3, &(0x7f0000000040)) 22:42:56 executing program 2: io_setup(0xfffffffc, &(0x7f00000000c0)) 22:42:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x7ff, &(0x7f0000002600)=0x0) io_submit(r1, 0x1, &(0x7f0000002840)=[&(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 22:42:56 executing program 5: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x18800c, &(0x7f0000000200)) [ 582.804378][ T36] audit: type=1326 audit(1622500976.550:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x500}, {0x2}, {0x6}]}) 22:42:56 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000040)='asymmetric\x00', &(0x7f00000000c0)=@secondary) 22:42:57 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 22:42:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:57 executing program 5: syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0']) [ 583.718884][ T36] audit: type=1326 audit(1622500977.470:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16446 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:57 executing program 3: io_setup(0x4, &(0x7f0000000000)=0x0) epoll_create1(0x0) r1 = eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001a00)=[&(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)="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", 0xf80, 0x0, 0x0, 0x1, r1}]) 22:42:57 executing program 4: socketpair(0x2, 0xa, 0x0, &(0x7f0000000280)) 22:42:57 executing program 2: io_setup(0x3f, &(0x7f0000001680)) [ 584.038738][T16455] fuse: Bad value for 'fd' [ 584.053139][T16455] fuse: Bad value for 'fd' 22:42:58 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x102) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x38, 0x0, 0x0, [{0x0, 0x0, 0xa, 0x0, '/dev/fuse\x00'}]}, 0x38) 22:42:58 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x90000, 0x0) [ 584.531709][ T36] audit: type=1326 audit(1622500978.280:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16446 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:58 executing program 3: prctl$PR_GET_SPECULATION_CTRL(0x3a, 0x0, 0x0) 22:42:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x600}, {0x2}, {0x6}]}) 22:42:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=@newqdisc={0x28, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_STAB={0x4}]}, 0x28}}, 0x0) 22:42:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:42:58 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='global_dirty_state\x00', r0}, 0x10) write$cgroup_subtree(r2, 0x0, 0x32600) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001400)=ANY=[], 0xda00) write$cgroup_int(r4, &(0x7f0000000200), 0x24000) 22:42:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001f40)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002100)={'syztnl0\x00', &(0x7f0000000380)={'gretap0\x00', 0x0, 0x0, 0x7800, 0x4, 0x3, {{0xe, 0x4, 0x0, 0x0, 0x38, 0x2065, 0x0, 0x0, 0x29, 0x0, @local, @empty, {[@timestamp_addr={0x44, 0x24, 0x6a, 0x1, 0x0, [{@multicast1}, {@remote}, {@multicast2}, {@multicast2}]}]}}}}}) syz_emit_ethernet(0x47, &(0x7f0000000080)={@local, @broadcast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "0ba880", 0x11, 0x11, 0x0, @remote, @private1, {[], {0x4e22, 0x4e23, 0x11, 0x0, @gue={{0x2, 0x0, 0x0, 0x0, 0x0, @val=0x80}, "a6"}}}}}}}, 0x0) [ 585.254730][ T36] audit: type=1326 audit(1622500979.001:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16473 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:42:59 executing program 3: setrlimit(0x0, &(0x7f0000000000)={0x5, 0x81}) 22:42:59 executing program 2: r0 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) 22:42:59 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x1a, 0x0, 0x0) 22:42:59 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) mount$bind(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f00000004c0)={{}, "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"}) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000014c0)=ANY=[@ANYBLOB]) 22:42:59 executing program 5: io_setup(0xe59, &(0x7f0000000000)=0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) io_submit(r0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, r1, 0x0}]) [ 586.089749][ T36] audit: type=1326 audit(1622500979.841:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16473 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x700}, {0x2}, {0x6}]}) 22:43:00 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x44, 0x6, 0x430, 0x2d0, 0x0, 0x1e0, 0x98, 0x1e0, 0x398, 0x398, 0x398, 0x398, 0x398, 0x6, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x1e0}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'vcan0\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@uncond, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @remote}}}}, {{@ip={@rand_addr, @multicast2, 0x0, 0x0, 'syzkaller0\x00', 'bond0\x00'}, 0x0, 0xc8, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@inet=@dccp={{0x30}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@inet=@dccp={{0x30}}]}, @common=@unspec=@NFQUEUE3={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) 22:43:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, 0x0) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:00 executing program 4: syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x191101) [ 586.817784][ T36] audit: type=1326 audit(1622500980.571:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16504 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:00 executing program 5: io_setup(0x3f, &(0x7f0000001680)=0x0) io_submit(r0, 0x1, &(0x7f0000001900)=[&(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_submit(r0, 0x1, &(0x7f0000000700)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x0, r1, 0x0}]) 22:43:01 executing program 4: socketpair(0xa, 0x0, 0x40000000, &(0x7f0000000280)) 22:43:01 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x102) write$FUSE_DIRENT(r0, 0x0, 0x0) 22:43:01 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) symlinkat(&(0x7f0000000640)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000680)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 587.618494][ T36] audit: type=1326 audit(1622500981.371:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16504 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:01 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xa4(Q\x80Fy\xb5\xe4q\xc9\xff \xd8\x9d\xad\x11B\x84\xb6\x1e\x835F\xef\x19\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\xb8\xfe4\xda\x80e\x94az\x04\xf1k\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f\x1f\xc2e/\x8d\x1e\n\xd0_\xbd!^\xa46\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8', 0x0) write$binfmt_elf32(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300b3000000000028002400b3d7c52ebf31a8d5c8c3c6cb00000009e500d5ffffffffffffff03000000110000000d6039017088d7c27f000000a9030001007ea85ca6574e9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 22:43:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x900}, {0x2}, {0x6}]}) 22:43:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, 0x0) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:01 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x0) io_setup(0x6, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000001cc0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000080)}]) 22:43:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xc}}, [@filter_kind_options=@f_bpf={{0x8}, {0x20, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x6}]}}, @TCA_BPF_CLASSID={0x8}]}}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=@dellink={0x20, 0x11, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) [ 588.412093][ T36] audit: type=1326 audit(1622500982.161:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16535 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:02 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000000)=0x45) 22:43:02 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$chown(0x4, r1, 0x0, 0x0) [ 588.583737][T16546] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 588.744634][T16546] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 22:43:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000002400)={{}, {0x1, @dev}, 0x0, {0x2, 0x0, @empty}, 'veth0_to_team\x00'}) 22:43:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xc}}, [@filter_kind_options=@f_bpf={{0x8}, {0x20, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x6}]}}, @TCA_BPF_CLASSID={0x8}]}}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=@dellink={0x20, 0x11, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 22:43:02 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) read$FUSE(r0, &(0x7f0000001940)={0x2020}, 0x2020) 22:43:03 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='keyring\x00', 0x0, r0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) openat$bsg(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) keyctl$unlink(0x9, 0x0, r3) [ 589.218651][ T36] audit: type=1326 audit(1622500982.971:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16535 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, 0x0) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xa00}, {0x2}, {0x6}]}) [ 589.623604][T16580] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 22:43:03 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) [ 589.899946][ T36] audit: type=1326 audit(1622500983.651:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16589 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:03 executing program 3: ioperm(0x3ff, 0x4, 0x0) 22:43:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000), &(0x7f0000000040)=0x4) 22:43:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xc}}, [@filter_kind_options=@f_bpf={{0x8}, {0x20, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x6}]}}, @TCA_BPF_CLASSID={0x8}]}}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=@dellink={0x20, 0x11, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 22:43:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000180), 0x4) [ 590.451749][T16605] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 22:43:04 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x40482, 0x0) [ 590.732143][ T36] audit: type=1326 audit(1622500984.481:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16589 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xc}}, [@filter_kind_options=@f_bpf={{0x8}, {0x20, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x6}]}}, @TCA_BPF_CLASSID={0x8}]}}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=@dellink={0x20, 0x11, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 22:43:04 executing program 5: sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000002040)={0x0, 0x0, 0x0}, 0x0) io_setup(0x7ff, &(0x7f0000002600)) 22:43:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xb00}, {0x2}, {0x6}]}) 22:43:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:04 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000041c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) [ 591.228833][T16628] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 22:43:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000140)) [ 591.416782][ T36] audit: type=1326 audit(1622500985.171:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16638 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000080), 0x4) 22:43:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x0, 0x0, 0x0, 0x1014}, 0x40) 22:43:05 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x44000) 22:43:05 executing program 3: ioperm(0x3ff, 0x4, 0x26ce) 22:43:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00'}) [ 592.235749][ T36] audit: type=1326 audit(1622500985.991:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16638 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:06 executing program 2: bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x11) 22:43:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xc00}, {0x2}, {0x6}]}) 22:43:06 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) 22:43:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:06 executing program 3: sendmsg$NL80211_CMD_SET_PMK(0xffffffffffffffff, 0x0, 0x1ff05cfde6d07c0) 22:43:06 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000040)={0x8}, 0x0, 0x0, 0x0, 0x0) 22:43:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1b, 0x0, &(0x7f0000000080)) [ 592.899587][ T36] audit: type=1326 audit(1622500986.651:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16667 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @sco={0x1f, @none}, @vsock}) 22:43:07 executing program 3: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000001c0)) 22:43:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0xc215949a250cfa9f, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 22:43:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000180)=0x4, 0x4) [ 593.735244][ T36] audit: type=1326 audit(1622500987.492:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16667 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xd00}, {0x2}, {0x6}]}) 22:43:07 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/block/loop3', 0x0, 0x0) 22:43:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1e, 0x0, &(0x7f0000000240)) 22:43:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f00000021c0), 0x4, 0x40000041, &(0x7f0000002300)) 22:43:08 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/bcm203x', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) [ 594.461036][ T36] audit: type=1326 audit(1622500988.212:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16692 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:08 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 22:43:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f0000000100)) 22:43:08 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 22:43:08 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000005200), &(0x7f0000005280)={0x0}) 22:43:09 executing program 3: bpf$MAP_CREATE(0x8, 0x0, 0x7) [ 595.287761][ T36] audit: type=1326 audit(1622500989.042:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16692 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:09 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 22:43:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xe00}, {0x2}, {0x6}]}) 22:43:09 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x1}, 0x10) 22:43:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="ffffff9e00000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x3c}}, 0x0) [ 595.837005][ T36] audit: type=1326 audit(1622500989.592:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16720 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:09 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000e40)=[{{&(0x7f0000000000)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0, 0x0, &(0x7f0000000380)=[{0xc}, {0xc, 0x1}], 0x18}}], 0x1, 0x0) [ 596.062106][T16728] device ipvlan2 entered promiscuous mode [ 596.070928][T16728] 8021q: adding VLAN 0 to HW filter on device ipvlan2 22:43:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000002d00)={&(0x7f0000000180), 0xc, &(0x7f0000002cc0)={&(0x7f0000000500)={0x450, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x40c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xbb, 0x5, "bad5b12b224582ae4418f6fae2d03de786f7a421dfafdc9d0624720ae73422b200c97c939470fa8b959d6d6ed4694f3d3a60619d1c107592ac5686220bee1e6f8ab71a965c9404884266423d18e8bf41855a409faa57f21fa11dc8019238565c556d1eef9a1fb7efe74b3aba6a605e368dd61530ea2182d887a1cecabad611153fe1d79d6ae218b3df4045203de61d51ecfe1b8c5420aa1da77a72c00e82ad234d178bed808c86b0bbfc05ad120e6ead077f0643873007"}, @ETHTOOL_A_BITSET_MASK={0x40, 0x5, "5111b59d3c21f5e86ad4087052a40c387b2a8b1a344d346e3a2ee2e8747d20dab9827e6a103131c16998f18c285e4c89b375e07cdb24518410069505"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x5}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x280, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x100, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '^[]\x01}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x5f, 0x5, "48d759f4f4ed0d45d1692a22fab30e73e5515784ae09333cdc18f98f7a9da4778bcab81c45fd01108655ba9c243a890d5f7e71d97fd5bdbdd1249659d7bab9578f162ee04953cc66f372799af2b275d88161d103684eb2c92b157f"}, @ETHTOOL_A_BITSET_BITS={0xf8, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '--){@+!\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '{(\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x10, 0x5, "eb0916df4c3aa8c2ce2942df"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x450}}, 0x0) 22:43:10 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8980, 0x0) 22:43:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@private1, @private1, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x411a0005}) 22:43:10 executing program 3: r0 = syz_io_uring_setup(0x4d79, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000240)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000005c0)={'ip6gre0\x00', 0x0}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x12, r0, 0x8000000) [ 596.658498][T16741] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 596.678337][ T36] audit: type=1326 audit(1622500990.432:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16720 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 596.724148][T16744] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 22:43:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={0x0}}, 0x0) 22:43:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xf00}, {0x2}, {0x6}]}) 22:43:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r1) 22:43:10 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[]) [ 597.312048][ T36] audit: type=1326 audit(1622500991.062:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16754 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:11 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NL80211_CMD_GET_COALESCE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x8401) 22:43:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), r0) 22:43:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000340)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000003}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0xe90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x34, 0x3, "fe29cc6e1e7ed204eb18c4e8efbd4e9d5c9e2ad46cf6577dd87ab4793258953102a5c6c6dc18f8c957a13f0e0941272f"}, @TIPC_NLA_NODE_ID={0xca, 0x3, "0429f40425f62ac91c5dc6219831ca6d10441fc911507aa2c2489de3303e74a8bac701fa4339fcec50d6283332d940829e595190ddcb2f367d8a3479b27d52773fc2adc0ba8a6d4c5afb0a35a147b11639d88acf3c48a9492fbf6a2e0d0ff9dd8d5afe48a7dd4b90e3e9e68b6951347eedbe4236f27e4a5b857f6e0bab8e2dfcd00c6d526a764028a33c3d47b84056b92f4f61f915543584fe04ce3279ae2cab04788e98fbf281584fd34cde69de3ede7022e3acf84f57bacf1ee92ba75d790280e00e43b10c"}, @TIPC_NLA_NODE_ID={0xd87, 0x3, "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"}]}]}, 0xec4}}, 0x0) 22:43:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 22:43:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000180)=0x14, 0x4) [ 598.144484][ T36] audit: type=1326 audit(1622500991.892:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16754 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:11 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{0x0, 0x0, 0x2060}, {&(0x7f0000000480)="cffa962c71e6b0caeab8716f89f8", 0xe, 0x8}], 0x0, &(0x7f0000000040)) 22:43:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x1100}, {0x2}, {0x6}]}) 22:43:12 executing program 2: r0 = io_uring_setup(0x406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, r1) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) [ 598.565689][T16781] loop4: detected capacity change from 0 to 32 [ 598.597293][T16781] FAT-fs (loop4): bogus logical sector size 28972 [ 598.604088][T16781] FAT-fs (loop4): Can't find a valid FAT filesystem [ 598.672728][T16781] loop4: detected capacity change from 0 to 32 [ 598.683404][T16781] FAT-fs (loop4): bogus logical sector size 28972 [ 598.690567][T16781] FAT-fs (loop4): Can't find a valid FAT filesystem [ 598.776191][ T36] audit: type=1326 audit(1622500992.532:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16785 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:12 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89a0, 0x0) 22:43:12 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDENABIO(r0, 0x4b32) 22:43:12 executing program 2: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='.\x00') 22:43:12 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$FITHAW(r0, 0xc0045878) 22:43:13 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000000)=0x2001, 0x8) [ 599.624639][ T36] audit: type=1326 audit(1622500993.382:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16785 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:13 executing program 2: openat$vcsu(0xffffff9c, &(0x7f0000000040), 0xd0842, 0x0) 22:43:13 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5452, &(0x7f0000000240)={'wg2\x00'}) 22:43:13 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0xc0189436, &(0x7f0000000240)={'wg2\x00'}) 22:43:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x1200}, {0x2}, {0x6}]}) 22:43:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, 0x0, 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000340)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0xea0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_ID={0xc9, 0x3, "0429f40425f62ac91c5dc6219831ca6d10441fc911507aa2c2489de3303e74a8bac701fa4339fcec50d6283332d940829e595190ddcb2f367d8a3479b27d52773fc2adc0ba8a6d4c5afb0a35a147b11639d88acf3c48a9492fbf6a2e0d0ff9dd8d5afe48a7dd4b90e3e9e68b6951347eedbe4236f27e4a5b857f6e0bab8e2dfcd00c6d526a764028a33c3d47b84056b92f4f61f915543584fe04ce3279ae2cab04788e98fbf281584fd34cde69de3ede7022e3acf84f57bacf1ee92ba75d790280e00e43b1"}, @TIPC_NLA_NODE_ID={0xdc9, 0x3, "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"}]}]}, 0xec4}}, 0x0) [ 600.210052][ T36] audit: type=1326 audit(1622500993.962:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16817 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:14 executing program 2: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000880)='/sys/class/ata_link', 0x0, 0x0) connect$vsock_stream(r0, 0x0, 0x0) 22:43:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x5000, &(0x7f00000003c0)) 22:43:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={0x0, 0xf0ff7f}}, 0x0) 22:43:14 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='lock_acquire\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000006c0)={'batadv_slave_1\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 22:43:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0xc, 0x6, 0x201}, 0x14}}, 0x0) 22:43:14 executing program 5: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2202000, &(0x7f00000000c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) [ 601.046031][ T36] audit: type=1326 audit(1622500994.802:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16817 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind(r0, 0x0, 0x1700) 22:43:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x2000}, {0x2}, {0x6}]}) 22:43:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, 0x0, 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg1\x00'}) 22:43:15 executing program 2: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000880)='/sys/class/ata_link', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000140)=@known='trusted.syz\x00') 22:43:15 executing program 5: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000880)='/sys/class/ata_link', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x2, &(0x7f0000000000)={'wg2\x00'}) [ 601.751625][ T36] audit: type=1326 audit(1622500995.502:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16853 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:15 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) fsetxattr$security_ima(r0, 0x0, 0x0, 0x0, 0x0) 22:43:15 executing program 3: openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/tracing', 0x0, 0x0) 22:43:16 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) creat(&(0x7f000000a100)='./file0\x00', 0x0) 22:43:16 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "198d98", 0x8, 0x3a, 0x0, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {[], @ndisc_rs}}}}}, 0x0) [ 602.577950][ T36] audit: type=1326 audit(1622500996.333:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16853 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x18, r1, 0x29363d66e6beef7b, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 22:43:16 executing program 3: r0 = openat$fuse(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'trusted.', '/dev/fuse\x00'}) 22:43:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x2500}, {0x2}, {0x6}]}) 22:43:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x1) [ 603.222233][ T36] audit: type=1326 audit(1622500996.973:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16884 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, 0x0, 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:17 executing program 5: socketpair(0x10, 0x2, 0xc6b, &(0x7f0000000000)) 22:43:17 executing program 4: io_setup(0x7, &(0x7f0000000040)) io_setup(0x401, &(0x7f00000002c0)) io_setup(0x20, &(0x7f0000000280)) io_setup(0x8000, &(0x7f00000004c0)) io_setup(0x7f, &(0x7f0000000300)) 22:43:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) 22:43:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000340)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000003}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0xe90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x34, 0x3, "fe29cc6e1e7ed204eb18c4e8efbd4e9d5c9e2ad46cf6577dd87ab4793258953102a5c6c6dc18f8c957a13f0e0941272f"}, @TIPC_NLA_NODE_ID={0xca, 0x3, "0429f40425f62ac91c5dc6219831ca6d10441fc911507aa2c2489de3303e74a8bac701fa4339fcec50d6283332d940829e595190ddcb2f367d8a3479b27d52773fc2adc0ba8a6d4c5afb0a35a147b11639d88acf3c48a9492fbf6a2e0d0ff9dd8d5afe48a7dd4b90e3e9e68b6951347eedbe4236f27e4a5b857f6e0bab8e2dfcd00c6d526a764028a33c3d47b84056b92f4f61f915543584fe04ce3279ae2cab04788e98fbf281584fd34cde69de3ede7022e3acf84f57bacf1ee92ba75d790280e00e43b10c"}, @TIPC_NLA_NODE_ID={0xd87, 0x3, "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"}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x10c4}, 0x0) 22:43:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg0\x00'}) [ 604.047980][ T36] audit: type=1326 audit(1622500997.803:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16884 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:17 executing program 3: openat$sysfs(0xffffff9c, &(0x7f0000000180)='/sys/block/ram9', 0x410002, 0x0) 22:43:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x3f00}, {0x2}, {0x6}]}) 22:43:18 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=']) 22:43:18 executing program 5: r0 = openat$urandom(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x0, 0x41, "ed280efd4e26012b40cd7f18edb15c6818933f8f24bf0712a7ba0bca86ca9f00b66c23f4e9d1ab57d424c6ece1287a168a846623687ef224eda2eec0e7285bafb1"}) 22:43:18 executing program 2: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="ac", 0x1, 0x16f8796}], 0x0, 0x0) [ 604.753162][ T36] audit: type=1326 audit(1622500998.503:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16912 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:18 executing program 3: setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f00000000c0), 0xfffffffffffffec6) 22:43:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:18 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) creat(&(0x7f000000a100)='./file0\x00', 0x2fb) 22:43:18 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) [ 605.056533][T16920] loop2: detected capacity change from 0 to 94087 [ 605.205336][T16920] loop2: detected capacity change from 0 to 94087 22:43:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x46, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x40) 22:43:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000180)=0x14, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={0x0}}, 0x0) 22:43:19 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000001580)={[], [], 0xa}) [ 605.571466][ T36] audit: type=1326 audit(1622500999.323:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16912 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x300}, 0x0) 22:43:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x4000}, {0x2}, {0x6}]}) [ 605.904519][T16945] FAT-fs (loop5): Unrecognized mount option " [ 605.904519][T16945] " or missing value 22:43:19 executing program 3: bpf$MAP_CREATE(0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 606.049648][T16945] FAT-fs (loop5): Unrecognized mount option " [ 606.049648][T16945] " or missing value 22:43:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000002d00)={&(0x7f0000000180), 0xc, &(0x7f0000002cc0)={&(0x7f0000000500)={0x450, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x24}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x110, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xbb, 0x5, "bad5b12b224582ae4418f6fae2d03de786f7a421dfafdc9d0624720ae73422b200c97c939470fa8b959d6d6ed4694f3d3a60619d1c107592ac5686220bee1e6f8ab71a965c9404884266423d18e8bf41855a409faa57f21fa11dc8019238565c556d1eef9a1fb7efe74b3aba6a605e368dd61530ea2182d887a1cecabad611153fe1d79d6ae218b3df4045203de61d51ecfe1b8c5420aa1da77a72c00e82ad234d178bed808c86b0bbfc05ad120e6ead077f0643873007"}, @ETHTOOL_A_BITSET_MASK={0x40, 0x5, "5111b59d3c21f5e86ad4086352a40c387b2a8b1a344d346e3a2ee2e8747d20dab9827e6a103131c16998f18c285e4c89b375e07cdb24518410069505"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x280, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x100, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '^[]\x01}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x5f, 0x5, "48d759f4f4ed0d45d1692a22fab30e73e5515784ae09333cdc18f98f7a9da4778bcab81c45fd01108655ba9c243a890d5f7e71d97fd5bdbdd1249659d7bab9578f162ee04953cc66f372799af2b275d88161d103684eb2c92b157f"}, @ETHTOOL_A_BITSET_BITS={0xf8, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '--){@+!\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '{(\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x10, 0x5, "eb0916df4c3aa8c2ce2942df"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x450}}, 0x0) [ 606.289689][ T36] audit: type=1326 audit(1622501000.043:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16956 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:20 executing program 5: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)) 22:43:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:20 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/slabinfo\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x332, 0x0, 0x0) 22:43:20 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000e40)=[{{&(0x7f0000000000)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0, 0x0, &(0x7f0000000380)=[{0xc}, {0xc}], 0x18}}], 0x1, 0x0) [ 606.631472][T16963] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 606.663669][T16964] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 22:43:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) [ 607.106542][ T36] audit: type=1326 audit(1622501000.863:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16956 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:21 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @hyper}, 0x10) 22:43:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x4800}, {0x2}, {0x6}]}) [ 607.347305][T16969] ISOFS: Unable to identify CD-ROM format. 22:43:21 executing program 2: socket$inet(0x2, 0x3, 0x3) 22:43:21 executing program 4: prctl$PR_SET_MM_AUXV(0x24, 0xc, 0x0, 0x0) [ 607.834451][T16969] ISOFS: Unable to identify CD-ROM format. [ 607.978173][ T36] audit: type=1326 audit(1622501001.733:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16988 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:21 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8901, &(0x7f0000000240)={'wg2\x00'}) 22:43:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 22:43:22 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20044011, &(0x7f0000000100)={0x2, 0x4e23, @loopback}, 0x10) 22:43:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x300}, 0x0) [ 608.802354][ T36] audit: type=1326 audit(1622501002.553:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16988 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x5411, &(0x7f0000000100)={@private0}) 22:43:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x4c00}, {0x2}, {0x6}]}) 22:43:22 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x1, &(0x7f0000001580)) 22:43:23 executing program 3: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC]) 22:43:23 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuseblk(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000080)=r1) [ 609.655885][ T36] audit: type=1326 audit(1622501003.413:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17016 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 609.743117][T17019] FAT-fs (loop5): bogus number of reserved sectors [ 609.750176][T17019] FAT-fs (loop5): Can't find a valid FAT filesystem 22:43:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 609.840881][T17024] fuse: Bad value for 'fd' [ 609.860447][T17019] FAT-fs (loop5): bogus number of reserved sectors [ 609.867775][T17019] FAT-fs (loop5): Can't find a valid FAT filesystem 22:43:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind(r0, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80) [ 609.892398][T17024] fuse: Bad value for 'fd' 22:43:24 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuseblk(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000080)=r1) 22:43:24 executing program 3: syz_open_procfs$userns(0x0, &(0x7f0000000040)) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000000c0)) 22:43:24 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 22:43:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000002d00)={&(0x7f0000000180), 0xc, &(0x7f0000002cc0)={&(0x7f0000000500)={0x450, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x105, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xbb, 0x5, "bad5b12b224582ae4418f6fae2d03de786f7a421dfafdc9d0624720ae73422b200c97c939470fa8b959d6d6ed4694f3d3a60619d1c107592ac5686220bee1e6f8ab71a965c9404884266423d18e8bf41855a409faa57f21fa11dc8019238565c556d1eef9a1fb7efe74b3aba6a605e368dd61530ea2182d887a1cecabad611153fe1d79d6ae218b3df4045203de61d51ecfe1b8c5420aa1da77a72c00e82ad234d178bed808c86b0bbfc05ad120e6ead077f0643873007"}, @ETHTOOL_A_BITSET_MASK={0x40, 0x5, "5111b59d3c21f5e86ad4086352a40c387b2a8b1a344d346e3a2ee2e8747d20dab9827e6a103131c16998f18c285e4c89b375e07cdb24518410069505"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x280, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x100, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '^[]\x01}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x5f, 0x5, "48d759f4f4ed0d45d1692a22fab30e73e5515784ae09333cdc18f98f7a9da4778bcab81c45fd01108655ba9c243a890d5f7e71d97fd5bdbdd1249659d7bab9578f162ee04953cc66f372799af2b275d88161d103684eb2c92b157f"}, @ETHTOOL_A_BITSET_BITS={0xf8, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '--){@+!\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '{(\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x10, 0x5, "eb0916df4c3aa8c2ce2942df"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x450}}, 0x0) [ 610.460352][ T36] audit: type=1326 audit(1622501004.213:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17016 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x6000}, {0x2}, {0x6}]}) 22:43:24 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20044011, &(0x7f0000000100)={0x2, 0x4e23, @loopback}, 0x10) 22:43:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 611.192817][ T36] audit: type=1326 audit(1622501004.944:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:25 executing program 2: bpf$MAP_CREATE(0x1d, 0x0, 0x0) 22:43:25 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuseblk(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000080)=r1) 22:43:25 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8904, 0x0) 22:43:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x28}}, 0x0) 22:43:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000340)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0xe90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x31, 0x3, "fe29cc6e1e7ed204eb18c4e8efbd4e9d5c9e2ad46cf6577dd87ab4793258953102a5c6c6dc18f8c957a13f0e09"}, @TIPC_NLA_NODE_ID={0xc9, 0x3, "0429f40425f62ac91c5dc6219831ca6d10441fc911507aa2c2489de3303e74a8bac701fa4339fcec50d6283332d940829e595190ddcb2f367d8a3479b27d52773fc2adc0ba8a6d4c5afb0a35a147b11639d88acf3c48a9492fbf6a2e0d0ff9dd8d5afe48a7dd4b90e3e9e68b6951347eedbe4236f27e4a5b857f6e0bab8e2dfcd00c6d526a764028a33c3d47b84056b92f4f61f915543584fe04ce3279ae2cab04788e98fbf281584fd34cde69de3ede7022e3acf84f57bacf1ee92ba75d790280e00e43b1"}, @TIPC_NLA_NODE_ID={0xd85, 0x3, "92fd1906ac7e219a7434fbbc71f4b91cd89013aa89552eefcde4134b21c011919cd1b062b96c70fe44cd13129feabaee28fdcf2ec5a9f646e589e1dfeec97b916a021a6b055d7585797e4a395403c78735770e2b137ecb7e7c8777c854d950b7aa8d0dc68281f035a9239569eb4c12e4ec53b34c6a1004553a281df9200b01fb79a57ab48d43851bb1867d49b554c8fb4ecdd878e564087c53756027744848c9357c8cf920115e9207b77a3b034b8aa56309871b0cf260e2440cbcfb21b1dd674ba1ebf187908d5eaf32a4be908dc51c739c748ed28a4b81688e63bbe11def7b7eb2f50a53f2225265255f2594ded8e03784bb4319616a21da698b79f8f965f83f3a39fa74e31ca0a3d7030d316a3b62136e537e9b48c55e6de32bd890daa38f7b14f3d6eb119e5019c6f37889871b08693fceffacd0c98d0a1b150599a8d56073c9148ba0cb0f34f4b09e42e015b33db786078c15906c490763f49f69532c93f553f6e130ff9690666c45c665b1787b8c178465435bfba5afdc7c2a9beef2d9aac96cab15c2b14363446a4529dd1beda52f6c7edd8247aa11db4f99a77b76602d193be8bd042e1acdcd172270112c7808a92447c0220ba2cb03a3cb112b7ebd7ea38c26755e823dad74423985552b8fe59e192bb3355048e91d7effba9bc3666324b2ad675c5a87c912d8937b4b4cfd8b778f8364523aca2fb0b5420e7a6a41316c03a9015c975c9f24c511f9670410866c370907e2368616e4ffa64a6eb1f3a36a2782cdfc41dab2a3682adc5f0d1d3da7bff74e79a99a429b1e434bd66684e6a81d3e218f7cc1dc62d5e52482d47dbdeccb956caf0fc140e3bc749dbf10463ad08db40a362ae07e02206593236f042409fe7f375eee647479b767867643154c3d793dd1b45a4073c2ee1c1555dc1ad67af831540b0896cc4424590fa56f86f0c09a71dc5308c0285c15a49d6e03abd83b444e668982aba145956cfcc0c9d6061570a7c8b157b5c6616d8f1724106b1132f0f63679b3bd65cb6d62458750a4355f52a76e385001ce67673353829712343b9d98126fd9adfd293a4cdbc315817a1771b094c3e44182a9ecb98e9820ce4ab9880f9b613edc695c1fe6c2d6cf50b2725dbe999440e5b8bba290340f8b258f17f8fa0d187eaa69165f4947ccdb8bcf33b113ea71cb0fbfa2c0b32123b69e09a2eb379f8bb0572b67dccede897a14b8f6e74078894fb39844f0edded82224b48e4f28fccf9598c4aadbb14037b2ea1918dfea90d5af082a67f241eea27fac551a3c260e9b41655b88c788c5ebb64fe3ea0698fd633ffd476a87056ec2e2260df74cb001489d10241cfb7ef7ca02f9ffce1d754dfd19e817e60bfb1d753b56ed8a7ab403c3570691438c087d0afdba347ddd05b8e8bd1701d01097406174f5d3a1de302ab5e361dd1d000eafc9e2c42b70235a9c4089a77a154caa5e073c1d2b9e5f32d2a065b0452575fde40c559f72d6dffe6e1d9feb50ab95a53bed66b4eecc9d11f4e9dd2a0237ba5d2cf876ee4942c5605767a047bc42a9da9594ca66035fb71665243cfbbf74e5ce2d8c65e70a0c4bed9337e8507cf078d535e39a0180ef00ee22ae0f669798ea3a5b90ccc58edb101c253eaa483b2dd4b7114d54f091d8102e633a70f2a349aa3d175426665572595eb58b5c1dc7306eec0a9a68733caf7f72470c2580e003df24c57e081cf69aab56e62c291b1245828ea267ce2702fe4d54d33c618d62ce4d9271608b879467c84c685d04cac8805fa15d5a25d4352cae3211c17e8a5b25291f3cafe764b66e12bb8332760bbef2c29e7db275ba0070be8ae41feb2bed1082496a28dd42339b4527e32a562c11b2b58c22f57866d162cd167722da05b7be0eda2d8c929b1441740c4a45ebab91696b0ddfc30aaa2ae6dad8d031149e71f68e859eaa15447e74104cd94966bea5ac2e73674e5aafa0931be64fd21451ac9cd63bab05334d73deae9a836394c8213a281f49e7b55bdd86d51e35a3e8145f9b761c84edd9242443ecfa9f2f492f9564fccc61cdf22f0841aaf9ea66e38885a3fe4c7585ae216a23eff8fb97bfbec4d0f1bdfde7a2bcaa46c2a8267cc5eec5edf6c3c65551e840e2e8de2a83448bf454103c34f10de0a2d18dd7e7aac25f539008248d14aa09be3bc5ab9650bec6f4e32a97e11ed6f45c021e140420429b28b971ba6880ab75881de50c87fd080212f80b9fbea57fcbccae5049eb3b30e76f9dba329720afade3ae6785fe3539dcd5c7554f3ca182663df2719ec12da6c8c892781ad7c187361a4e41771859d88fb3bea0ed8cdac840e3dea6e3ec3ffaace41aaa1380bdedcc8680918a04eebe64fd4241122912b9211910efa283608d9600dc975417c0d5fe9ea3e72c86d6eaa45608750cb04e54dc83db59511fdb2b09a47a332a58c7b5fd3c542f3d31d3b65f78fe78342f10862e106a1211a70bfe5756af0b4d4dc9ad3098bb62e7e6d0c4011b9aa508111b45e3c051104c189a76e8d49f9227905b576352fc2f436244c78a90c17c13bff687e6b83eae0cb8bbd19ecad307f016ea3bcd8e085905412d3c55e0aa48132137a8ae73d672b948e88b6ad1608b7d004a2d133395fab8a6ef05f968ce3f188dbcf4e5d992e078467dbf9502fee691ff230638d450aef5d1383865bb8b30f6cc4d7c88a6d9d825960485c59f35070b156a1cfbdc29058a0d426b0b5f99a7cc08f923be2f539609acdff475220c1d6f9ebbadce628e1c3ae76f0c1f006be97618226a00e5787bb75d9b745c9be48e14b6c692d2519427339b8699d0b5d2ee9b78b3775590573b7e0f452463fb4f392439625df90cbf0496743bd420917fce553403258bb76dda988bcfe4249c92b729f5ea3f6926ad4cb07c62ca0b4cd06cf4f5828b60a4fdf61aa945cc4d2d8e0ef2996d17f10aa837aaa47879956fbb9105d7b8a7e61351b07f81061b0243d76e0e68731fe9905cb49c3c8d7380bfe19cc06e0e2ad0e4c06ce262694f588a71f3cc2c37c6b3219f3e76c90543b4782d96c8afd517633af365b21614d4611e2c45987678c305a68be660239e0797beabd5c6b09536e9aa2c72f1c53d2adba919cb3eecb8a6076c97d9953ee6bcc93c775b59112122ebc1d42cde678e38d5b17886c138a058854f27ef9411362a271b3cd21aef7e0676b1f877147295327deb60e56f586580fdd622e23f6dcdaa21a63d616336f384770afc6188f702d2d4fc29d4e6150a01c32e9f9a606e76743a2d129e687749c7c34580fe6c8ba76b6e8580fac4bbaa80c7b5d33a27ed60a4454ba6c33d031f9c285c1dbadeb6a2cfcf447b08dfce85e93fa17638974f4608379de8e07f2aae56e03aa1a8cd37b275471f51092d1bc6717dcc1403cf262af3df1a0784b2c2b41d7ef1d0abf6319aa40d88801dacb3eba3a66b93f8a7df5269b50c674066d01f2637db18452f48ae09d8f84a28d610dea8697fa4e518e1ca3793aae83258fbe09d809a4d102012fe7bbec823095a7d1759f63b6fc9fe17a0f3f360e26e530fb528ff5f284d869896fcca5d2347e8840c7ae39fb7828456dea19117922ced687c23af516d2b8f1f6142cc2dc3ac001ee4c2e706273649f70321d240e6a0ec09800ae73caa56f8fbe3d20f1fbb26542e0a1c18576cb39af225782141741b73783200111ff0524a6d11c3a09485cafda06119a8e761b32f1a8ac2614f13d03ce2f410a1ad7c0ec467346ba4c95411d56969187d8d8651252f01bec1188b45feb0a727167ac32ead14f377206e28fa1d20daa62827297b506fab3013c81985f5655ad1b6f71c137aaefb54ad8c7a76a9d9ef08b69390b581bcbb2ec8ba940a97e53bae8d2aeb8648823023c1049eb55f90c193be1fd9c3d92556b2f4ec5febb92f947b94eaa121df12eb011220a57be5cbd2bace8b458870259f2eba7632e9f77dbaf5241011a847c281b94aabe2d119a50e8490462a026a75db2b7f44891dbd2141d083bb33069ed830d8d34ac6a7d88d61055a0f2c3e682e260bed4bf2d516d33580cd10cf80263025a3638126e373d9f830d6330230c018173369ddf6e801f125d923a549e9ab31ec5fbe8a24fae646e3b73f4147dd7d3adb6f98b767bd891f312d5dfd8cf2ddcc9b6f4341135001a8306fddeab4eb1c0db938c3c73166fd3dbc020345e10831f23e7b758ed1f8547a4f99732c30b462c1b633f2956df9a05830cf42583c5dec3431034e19c4c1265e57b87ba12ebbad7275103ec889517814ad40858ecacff574c9633a74090b9ea4d33be728e24801327ca00d79610c4b04f10995e7d074d11f2e7827059e09fad6262475c9f52a8912f9146433de3bccfa438e1edd564b1568f199f3a24ee39ad57b370cf285311d3ecc2339b5b919b78db56164825cb2d7ff2af1681192da5a224e1920859353d704d1b7baf5ae144bf0fca781435f9150215be4612d8af707e6b30cdf4bdc93e1af53be9fa42b10036651cbf3e9973fd8600ceb8e53ddbcec943c4a85c9b126e50244bcb0b85d86c934a8418ecd3cff582ed05acd48912f065e5665ea64f91022bcb49fca885f0dda488af147ef3bf41b972c5bfc46a743630970ad5dc9a9618ceef2f21cda5fc272ce856d323fd0dbd0a0ea967f66c2a77152bad567af091a3fa0a4dd2c54fafe71f9758932043b5cf6fc87292d87ef0be63a0da89d269c51318d4ef633bb0f36ee3585b34e61503dacba36bb1902e83ecc8e8e01adf7a130706b1be585538d07132f500f22ad146443093fde44df309fe5894884ecaa0bcdd8762ee5679bfa8a5715187229312ddb1559be1c639dc7c7ba5a748deeac46c9062b4dda29ea4b471948b636c712517a6b11882609664c049e656cabda20"}]}]}, 0xec4}}, 0x0) 22:43:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000740), r0) 22:43:25 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuseblk(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000080)=r1) [ 612.027969][ T36] audit: type=1326 audit(1622501005.784:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x6800}, {0x2}, {0x6}]}) 22:43:26 executing program 5: r0 = io_uring_setup(0x460e, &(0x7f0000000000)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xc, 0x13, r0, 0x0) 22:43:26 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8940, &(0x7f0000000240)={'wg2\x00'}) 22:43:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 612.665760][ T36] audit: type=1326 audit(1622501006.424:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17086 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f000000ea40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e80)=[{0xc, 0x1}], 0xc}}], 0x2, 0x0) 22:43:26 executing program 4: r0 = openat$autofs(0xffffff9c, &(0x7f0000003300), 0x0, 0x0) fchownat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 22:43:27 executing program 5: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)={[{@block={'block', 0x3d, 0x800}}]}) 22:43:27 executing program 3: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}]}}) 22:43:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000340)={0xf0c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000003}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0xed8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_ID={0xca, 0x3, "0429f40425f62ac91c5dc6219831ca6d10441fc911507aa2c2489de3303e74a8bac701fa4339fcec50d6283332d940829e595190ddcb2f367d8a3479b27d52773fc2adc0ba8a6d4c5afb0a35a147b11639d88acf3c48a9492fbf6a2e0d0ff9dd8d5afe48a7dd4b90e3e9e68b6951347eedbe4236f27e4a5b857f6e0bab8e2dfcd00c6d526a764028a33c3d47b84056b92f4f61f915543584fe04ce3279ae2cab04788e98fbf281584fd34cde69de3ede7022e3acf84f57bacf1ee92ba75d790280e00e43b10c"}, @TIPC_NLA_NODE_ID={0xe02, 0x3, "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"}]}]}, 0xf0c}, 0x1, 0x0, 0x0, 0x10c4}, 0x0) [ 613.507454][ T36] audit: type=1326 audit(1622501007.264:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17086 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x7c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:43:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x6c00}, {0x2}, {0x6}]}) [ 613.756291][T17111] fuse: Bad value for 'fd' 22:43:27 executing program 2: r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 613.852574][T17111] fuse: Bad value for 'fd' [ 613.976715][T17110] ISOFS: Unable to identify CD-ROM format. 22:43:27 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x4020940d, &(0x7f0000000240)={'wg2\x00'}) [ 614.352699][T17110] ISOFS: Unable to identify CD-ROM format. [ 614.551016][ T36] audit: type=1326 audit(1622501008.304:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17124 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:28 executing program 4: mount$9p_fd(0x0, 0x0, 0x0, 0xc0ed0000, 0x0) 22:43:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6}, 0x40) 22:43:28 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0xf, 0x4) 22:43:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x0, 0x380}, 0x40) 22:43:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x2, 0x3, 0x2d8, 0x1a4, 0x1a4, 0x207fe, 0x1a4, 0x1a4, 0x244, 0x244, 0x244, 0x244, 0x244, 0x3, 0x0, {[{{@uncond, 0x0, 0x164, 0x1a4, 0xa, {0x9000000, 0xffff1f00}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x2}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, '\x00', 'vlan1\x00'}, 0x0, 0x70, 0xa0, 0x7e000000, {0xff00000000004802}}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x1a8, 0x70, 0x94, 0x0, {0x4402}}, {0x24}}}}, 0x334) 22:43:29 executing program 5: r0 = openat$fuse(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0x5450, 0x0) [ 615.364622][ T36] audit: type=1326 audit(1622501009.114:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17124 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:29 executing program 3: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0) 22:43:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x7400}, {0x2}, {0x6}]}) 22:43:29 executing program 2: r0 = openat$fuse(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0x4020940d, 0x0) [ 615.846818][T17151] Cannot find add_set index 0 as target [ 616.059878][ T36] audit: type=1326 audit(1622501009.814:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17153 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='D'], 0x33fe0}}, 0x0) 22:43:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:30 executing program 3: io_setup(0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x2, 0x3, 0x2d8, 0x1a4, 0x1a4, 0x207fe, 0x1a4, 0x1a4, 0x244, 0x244, 0x244, 0x244, 0x244, 0x3, 0x0, {[{{@uncond, 0x0, 0x164, 0x1a4, 0xa, {0x9000000, 0xffff1f00}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x2}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, '\x00', 'vlan1\x00'}, 0x0, 0x70, 0xa0, 0x7e000000, {0xff00000000004802}}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x1a8, 0x70, 0x94, 0x0, {0x4402}}, {0x24}}}}, 0x334) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) 22:43:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x8, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2401, 0x0) 22:43:30 executing program 5: mount$9p_fd(0xfd030000, 0x0, 0x0, 0x0, 0x0) 22:43:30 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8904, &(0x7f0000000240)={'wg2\x00'}) [ 616.839838][T17171] Cannot find add_set index 0 as target [ 616.877173][T17173] Cannot find add_set index 0 as target 22:43:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000002cc0)={&(0x7f0000000500)={0x18, r1, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}]}, 0x18}}, 0x0) [ 616.905333][ T36] audit: type=1326 audit(1622501010.664:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17153 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x7a00}, {0x2}, {0x6}]}) 22:43:30 executing program 4: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000380)) 22:43:30 executing program 3: bpf$MAP_CREATE(0x8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 22:43:31 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=f']) [ 617.487413][ T36] audit: type=1326 audit(1622501011.244:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17186 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 22:43:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x10}, 0x0) [ 617.804547][T17192] 9pnet: Could not find request transport: f 22:43:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:31 executing program 4: inotify_add_watch(0xffffffffffffffff, 0x0, 0x10000000) 22:43:31 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0xf6ffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) 22:43:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x80c, 0xffffffffffffffff) [ 618.327472][ T36] audit: type=1326 audit(1622501012.084:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17186 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8918, &(0x7f0000000100)={@private0}) 22:43:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xc000}, {0x2}, {0x6}]}) 22:43:32 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x127d, 0x0) [ 618.649984][T17206] 9pnet_virtio: no channels available for device 22:43:32 executing program 2: bpf$MAP_CREATE(0x1d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 22:43:32 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v3={0x3000000, [{0xd31, 0x1}, {0x200, 0x5}], 0xee00}, 0x18, 0x1) creat(&(0x7f000000a100)='./file0\x00', 0x0) [ 618.962217][ T36] audit: type=1326 audit(1622501012.714:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17211 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:33 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/bus/input/devices\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 22:43:33 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89a1, 0x0) 22:43:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:33 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = dup(r0) accept4$vsock_stream(r1, 0x0, 0x0, 0x0) 22:43:33 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f0000000200)="cbd7abee763af0714b3a3d68d73a2bc2b63deee9", 0x14, 0x2}, {0x0, 0x0, 0x2060}], 0x0, &(0x7f0000000040)) [ 619.786876][ T36] audit: type=1326 audit(1622501013.544:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17211 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) 22:43:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xc07f}, {0x2}, {0x6}]}) 22:43:33 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB]) [ 620.162468][T17236] loop5: detected capacity change from 0 to 32 [ 620.188179][T17236] FAT-fs (loop5): invalid media value (0xe9) [ 620.194430][T17236] FAT-fs (loop5): Can't find a valid FAT filesystem [ 620.260406][T17236] loop5: detected capacity change from 0 to 32 [ 620.295742][T17236] FAT-fs (loop5): invalid media value (0xe9) [ 620.302098][T17236] FAT-fs (loop5): Can't find a valid FAT filesystem 22:43:34 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000001580)) [ 620.434172][T17248] 9pnet: Insufficient options for proto=fd [ 620.544142][ T36] audit: type=1326 audit(1622501014.294:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17247 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:34 executing program 5: pipe2$9p(&(0x7f0000002400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 22:43:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) 22:43:34 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$DEVLINK_CMD_PORT_SPLIT(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 22:43:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:34 executing program 2: r0 = io_uring_setup(0x460e, &(0x7f0000000000)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) 22:43:35 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000880)='/sys/class/ata_link', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5452, &(0x7f0000000240)={'wg0\x00'}) 22:43:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000002d00)={&(0x7f0000000180), 0xc, &(0x7f0000002cc0)={&(0x7f0000000500)={0x450, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x40c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xbb, 0x5, "bad5b12b224582ae4418f6fae2d03de786f7a421dfafdc9d0624720ae73422b200c97c939470fa8b959d6d6ed4694f3d3a60619d1c107592ac5686220bee1e6f8ab71a965c9404884266423d18e8bf41855a409faa57f21fa11dc8019238565c556d1eef9a1fb7efe74b3aba6a605e368dd61530ea2182d887a1cecabad611153fe1d79d6ae218b3df4045203de61d51ecfe1b8c5420aa1da77a72c00e82ad234d178bed808c86b0bbfc05ad120e6ead077f0643873007"}, @ETHTOOL_A_BITSET_MASK={0x40, 0x5, "5111b59d3c21f5e86ad4086352a40c387b2a8b1a344d346e3a2ee2e8747d20dab9827e6a103131c16998f18c285e4c89b375e07cdb24518410069505"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xb94f}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x280, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x100, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '^[]\x01}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x5f, 0x5, "48d759f4f4ed0d45d1692a22fab30e73e5515784ae09333cdc18f98f7a9da4778bcab81c45fd01108655ba9c243a890d5f7e71d97fd5bdbdd1249659d7bab9578f162ee04953cc66f372799af2b275d88161d103684eb2c92b157f"}, @ETHTOOL_A_BITSET_BITS={0xf8, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '--){@+!\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '{(\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x10, 0x5, "eb0916df4c3aa8c2ce2942df"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x450}}, 0x0) [ 621.371882][ T36] audit: type=1326 audit(1622501015.125:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17247 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xe000}, {0x2}, {0x6}]}) 22:43:35 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89b1, &(0x7f0000000240)={'wg2\x00'}) 22:43:35 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000540)={[{@fat=@check_strict}]}) 22:43:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000007c0)=ANY=[], 0x114}}, 0x0) 22:43:35 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') fremovexattr(r0, &(0x7f0000000040)=@known='user.incfs.size\x00') [ 622.081617][ T36] audit: type=1326 audit(1622501015.835:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17279 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000340)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0xe90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x34, 0x3, "fe29cc6e1e7ed204eb18c4e8efbd4e9d5c9e2ad46cf6577dd87ab4793258953102a5c6c6dc18f8c957a13f0e0941272f"}, @TIPC_NLA_NODE_ID={0xca, 0x3, "0429f40425f62ac91c5dc6219831ca6d10441fc911507aa2c2489de3303e74a8bac701fa4339fcec50d6283332d940829e595190ddcb2f367d8a3479b27d52773fc2adc0ba8a6d4c5afb0a35a147b11639d88acf3c48a9492fbf6a2e0d0ff9dd8d5afe48a7dd4b90e3e9e68b6951347eedbe4236f27e4a5b857f6e0bab8e2dfcd00c6d526a764028a33c3d47b84056b92f4f61f915543584fe04ce3279ae2cab04788e98fbf281584fd34cde69de3ede7022e3acf84f57bacf1ee92ba75d790280e00e43b10c"}, @TIPC_NLA_NODE_ID={0xd87, 0x3, "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"}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x10c4}, 0x0) 22:43:36 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000003c0), 0x8) 22:43:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8912, &(0x7f0000000100)={@private0}) 22:43:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0xfffffffffffffffe}}, 0x0) [ 622.922268][ T36] audit: type=1326 audit(1622501016.675:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17279 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:36 executing program 3: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x831c48, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}}) 22:43:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x2, 0x3, 0x2d8, 0x1a4, 0x1a4, 0x207fe, 0x1a4, 0x1a4, 0x244, 0x244, 0x244, 0x244, 0x244, 0x3, 0x0, {[{{@uncond, 0x0, 0x164, 0x1a4, 0xa, {0x9000000, 0xffff1f00}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, '\x00', 'vlan1\x00'}, 0x0, 0x70, 0xa0, 0x7e000000, {0xff00000000004802}}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x1a8, 0x70, 0x94, 0x0, {0x4402}}, {0x24}}}}, 0x334) 22:43:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xf07f}, {0x2}, {0x6}]}) 22:43:37 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) 22:43:37 executing program 5: r0 = epoll_create(0x1) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) [ 623.627433][ T36] audit: type=1326 audit(1622501017.385:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17309 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x2, 0x3, 0x2d8, 0x1a4, 0x1a4, 0x207fe, 0x1a4, 0x1a4, 0x244, 0x244, 0x244, 0x244, 0x244, 0x3, 0x0, {[{{@uncond, 0x0, 0x164, 0x1a4, 0xa, {0x9000000, 0xffff1f00}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, '\x00', 'vlan1\x00'}, 0x0, 0x70, 0xa0, 0x7e000000, {0xff00000000004802}}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x1a8, 0x70, 0x94, 0x0, {0x4402}}, {0x24}}}}, 0x334) 22:43:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x0, 0x2}, 0x40) 22:43:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:37 executing program 4: syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0xfe2147bcaad042e7, &(0x7f0000000080)) 22:43:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), r0) [ 624.456516][ T36] audit: type=1326 audit(1622501018.215:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17309 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x2, 0x3, 0x2d8, 0x1a4, 0x1a4, 0x207fe, 0x1a4, 0x1a4, 0x244, 0x244, 0x244, 0x244, 0x244, 0x3, 0x0, {[{{@uncond, 0x0, 0x164, 0x1a4, 0xa, {0x9000000, 0xffff1f00}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, '\x00', 'vlan1\x00'}, 0x0, 0x70, 0xa0, 0x7e000000, {0xff00000000004802}}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x1a8, 0x70, 0x94, 0x0, {0x4402}}, {0x24}}}}, 0x334) 22:43:38 executing program 3: mount$9p_fd(0x9000000, 0x0, 0x0, 0x0, 0x0) 22:43:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xfc7f}, {0x2}, {0x6}]}) [ 624.849299][T17330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 22:43:38 executing program 4: r0 = openat$urandom(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)) 22:43:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xa140, 0x0) [ 625.250764][ T36] audit: type=1326 audit(1622501019.005:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x2, 0x3, 0x2d8, 0x1a4, 0x1a4, 0x207fe, 0x1a4, 0x1a4, 0x244, 0x244, 0x244, 0x244, 0x244, 0x3, 0x0, {[{{@uncond, 0x0, 0x164, 0x1a4, 0xa, {0x9000000, 0xffff1f00}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, '\x00', 'vlan1\x00'}, 0x0, 0x70, 0xa0, 0x7e000000, {0xff00000000004802}}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x1a8, 0x70, 0x94, 0x0, {0x4402}}, {0x24}}}}, 0x334) 22:43:39 executing program 3: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000880)='/sys/class/ata_link', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='system.sockprotoname\x00') 22:43:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:39 executing program 4: bpf$MAP_CREATE(0x21, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 22:43:39 executing program 5: socket(0x28, 0x0, 0xb7) [ 626.088882][ T36] audit: type=1326 audit(1622501019.845:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={0x0, 0xc0000000}}, 0x0) 22:43:40 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = dup(r0) bind$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @local}, 0x10) 22:43:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xff03}, {0x2}, {0x6}]}) 22:43:40 executing program 4: syz_io_uring_setup(0x52d1, &(0x7f00000001c0), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000000), 0x0) [ 626.842235][ T36] audit: type=1326 audit(1622501020.595:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17360 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000e40)=[{{&(0x7f0000000000)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0}}], 0x1, 0x0) 22:43:40 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) 22:43:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:41 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x541b, 0x0) 22:43:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='mountinfo\x00') fcntl$getown(r0, 0x9) [ 627.658815][ T36] audit: type=1326 audit(1622501021.415:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17360 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:41 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$packet(r2, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r3, 0x5451, 0x0) 22:43:41 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f0000000000)='./file0\x00', 0x4100, 0x0) 22:43:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xff7f}, {0x2}, {0x6}]}) 22:43:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={0x0, 0x2763}}, 0x0) 22:43:41 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x9, &(0x7f0000ffc000/0x2000)=nil, 0x2) [ 628.471235][ T36] audit: type=1326 audit(1622501022.225:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17388 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:42 executing program 2: r0 = timerfd_create(0x0, 0x0) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) dup2(r1, r0) 22:43:42 executing program 5: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = dup2(r0, r0) write$FUSE_WRITE(r1, 0x0, 0x0) 22:43:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:42 executing program 3: get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2) 22:43:42 executing program 4: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000) [ 629.301625][ T36] audit: type=1326 audit(1622501023.055:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17388 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:43 executing program 2: shmget$private(0x0, 0x3000, 0x80, &(0x7f0000ffd000/0x3000)=nil) 22:43:43 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001700)) 22:43:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x30000}, {0x2}, {0x6}]}) 22:43:43 executing program 3: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x3) 22:43:43 executing program 4: r0 = epoll_create(0x7fffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) dup2(r1, r0) [ 629.953328][ T36] audit: type=1326 audit(1622501023.705:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17416 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:43 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup2(r1, r0) write$FUSE_LK(r2, 0x0, 0x0) 22:43:44 executing program 5: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x8200, 0x0) 22:43:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000001300), 0x4) 22:43:44 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r0, &(0x7f00000002c0)={0x2020}, 0x2020) 22:43:44 executing program 2: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x4000) [ 630.772556][ T36] audit: type=1326 audit(1622501024.525:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17416 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:44 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) dup2(r0, r1) 22:43:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x40000}, {0x2}, {0x6}]}) 22:43:44 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r1, r0) 22:43:44 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) 22:43:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup2(r1, r0) [ 631.427443][ T36] audit: type=1326 audit(1622501025.175:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17445 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:45 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) r1 = inotify_init1(0x0) dup2(r0, r1) 22:43:45 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x0, 0x46) 22:43:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:45 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000), 0x0) 22:43:45 executing program 2: r0 = timerfd_create(0x0, 0x0) dup2(r0, r0) 22:43:46 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r1, r0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) [ 632.250980][ T36] audit: type=1326 audit(1622501026.006:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17445 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:46 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x501000, 0x0) 22:43:46 executing program 4: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) dup2(r0, r1) 22:43:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x50000}, {0x2}, {0x6}]}) 22:43:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, 0x16) [ 632.739586][ T3127] ieee802154 phy0 wpan0: encryption failed: -22 [ 632.746612][ T3127] ieee802154 phy1 wpan1: encryption failed: -22 22:43:46 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) [ 632.959314][ T36] audit: type=1326 audit(1622501026.716:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17481 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:46 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup2(r1, r0) write$FUSE_LSEEK(r2, 0x0, 0x0) 22:43:46 executing program 4: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 22:43:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='mountinfo\x00') r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000240)='mounts\x00') 22:43:47 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x2c8003, 0x0) 22:43:47 executing program 3: mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xc) 22:43:47 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup2(r1, r0) [ 633.786469][ T36] audit: type=1326 audit(1622501027.546:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17481 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:47 executing program 2: shmget(0x2, 0x3000, 0x200, &(0x7f0000ffc000/0x3000)=nil) 22:43:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x6a000}, {0x2}, {0x6}]}) 22:43:48 executing program 5: r0 = epoll_create(0x4) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 22:43:48 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000100)) [ 634.441561][ T36] audit: type=1326 audit(1622501028.196:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17511 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000000c0), 0x4) 22:43:48 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)) 22:43:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 634.814561][ T8474] Bluetooth: hci3: command 0x0406 tx timeout 22:43:48 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) 22:43:48 executing program 5: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xb) 22:43:48 executing program 4: mprotect(&(0x7f0000bbf000/0x1000)=nil, 0x1000, 0x1f) 22:43:48 executing program 2: shmget$private(0x0, 0xc000, 0x54000000, &(0x7f0000ff4000/0xc000)=nil) [ 635.277252][ T36] audit: type=1326 audit(1622501029.036:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17511 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x8e000}, {0x2}, {0x6}]}) 22:43:49 executing program 3: mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 22:43:49 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x511c02, 0x0) 22:43:49 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x101040, 0x10) 22:43:49 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) [ 635.844622][ T36] audit: type=1326 audit(1622501029.596:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17540 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:49 executing program 3: r0 = getuid() setreuid(r0, 0xee00) 22:43:50 executing program 5: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xa) 22:43:50 executing program 2: setitimer(0x1, 0x0, &(0x7f0000000180)) 22:43:50 executing program 4: setreuid(0x0, 0xee00) socket$packet(0x11, 0x0, 0x300) [ 636.670926][ T36] audit: type=1326 audit(1622501030.426:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17540 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)) 22:43:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xa9fc5}, {0x2}, {0x6}]}) [ 636.943292][T17565] syz-executor.2 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 22:43:50 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) syz_open_procfs(r1, &(0x7f0000000040)='statm\x00') 22:43:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0), 0x4) 22:43:51 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read$FUSE(r0, &(0x7f0000000300)={0x2020}, 0x2020) write$FUSE_ENTRY(r1, &(0x7f0000002340)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee01}}}, 0x90) 22:43:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x80, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 637.411888][ T36] audit: type=1326 audit(1622501031.166:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17568 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000040), 0x0, 0x811, 0x0, 0x0) 22:43:51 executing program 5: r0 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, 0x0, &(0x7f00000016c0)) 22:43:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000000), 0x4) 22:43:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) [ 638.267461][ T36] audit: type=1326 audit(1622501032.026:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17568 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) 22:43:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xda000}, {0x2}, {0x6}]}) 22:43:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x40000, &(0x7f0000000100)={0xa, 0x4e27, 0x0, @loopback}, 0x1c) 22:43:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, 0x0, 0x0) 22:43:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup(r0) [ 638.908745][ T36] audit: type=1326 audit(1622501032.666:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17598 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) 22:43:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e) [ 639.716510][ T36] audit: type=1326 audit(1622501033.476:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17598 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x50, 0x0, 0x0) 22:43:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x22, 0x0, &(0x7f0000000000)={0xa, 0x4e1e, 0x0, @loopback}, 0x1c) 22:43:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 22:43:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x100000}, {0x2}, {0x6}]}) 22:43:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x10, 0x0, 0x0) [ 640.141519][ T36] audit: type=1326 audit(1622501033.896:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17619 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, 0x0, 0x0) 22:43:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x40080, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 22:43:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) write$P9_RSYMLINK(r1, 0x0, 0x0) 22:43:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, 0x0, 0x0) 22:43:54 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f000000a280)='./file0\x00', 0x83, 0x4) [ 640.978489][ T36] audit: type=1326 audit(1622501034.736:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17619 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) [ 641.203239][ T36] audit: type=1804 audit(1622501034.956:364): pid=17647 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir666860003/syzkaller.XfO4Zj/410/file0" dev="sda1" ino=14049 res=1 errno=0 22:43:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b3"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:55 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockname$netlink(r0, 0x0, &(0x7f0000000000)) 22:43:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x200000}, {0x2}, {0x6}]}) 22:43:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 22:43:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockname$netlink(r1, 0x0, &(0x7f0000000080)) [ 641.649761][ T36] audit: type=1326 audit(1622501035.406:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17652 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) 22:43:55 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0xfffffed3) 22:43:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, 0x0, 0x0, 0x5, &(0x7f0000001000)={0xa, 0x4, 0x0, @empty}, 0x1c) 22:43:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001840), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, 0x0, 0x0) 22:43:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockname$netlink(r1, 0x0, &(0x7f0000000040)) 22:43:56 executing program 5: r0 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) [ 642.480552][ T36] audit: type=1326 audit(1622501036.236:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17652 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x400000}, {0x2}, {0x6}]}) 22:43:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:56 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 22:43:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 22:43:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000040)) 22:43:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) [ 643.257740][ T36] audit: type=1326 audit(1622501037.017:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17688 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 22:43:57 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000500)) 22:43:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:43:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) [ 644.078973][ T36] audit: type=1326 audit(1622501037.837:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17688 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:57 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x20a81, 0x0) write$P9_RLINK(r0, 0x0, 0x55) 22:43:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x600000}, {0x2}, {0x6}]}) 22:43:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) 22:43:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_mtu(r1, 0x29, 0x17, 0x0, 0x3a) 22:43:58 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 644.652011][ T36] audit: type=1326 audit(1622501038.407:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17719 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0xffffffffffffff75) 22:43:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RLINK(r1, 0x0, 0x0) 22:43:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, 0x1c) 22:43:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RLINK(r1, 0x0, 0x0) [ 645.463125][ T36] audit: type=1326 audit(1622501039.217:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17719 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000080)={0x0, 0x2710}, 0x10) 22:43:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 22:43:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:43:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) 22:43:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x800000}, {0x2}, {0x6}]}) 22:43:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$inet6_int(r1, 0x29, 0xcb, &(0x7f0000000000), 0x4) 22:43:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockname$inet6(r1, 0x0, &(0x7f0000000500)=0xffffffffffffffce) [ 646.034224][ T36] audit: type=1326 audit(1622501039.777:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17748 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:43:59 executing program 4: pipe(&(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 22:44:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000000)='(', 0x1, 0x1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:44:00 executing program 5: r0 = epoll_create(0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)) r2 = fcntl$dupfd(r0, 0x0, r0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f00000000c0)) 22:44:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) write$nbd(r1, 0x0, 0x0) 22:44:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x12022) [ 646.914388][ T36] audit: type=1326 audit(1622501040.657:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17748 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RRENAMEAT(r1, 0x0, 0x0) 22:44:00 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockname$unix(r1, 0x0, &(0x7f0000000080)) 22:44:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xa00600}, {0x2}, {0x6}]}) 22:44:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$inet6_int(r1, 0x29, 0xcb, 0x0, 0x0) 22:44:01 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) creat(&(0x7f0000000100)='./file0\x00', 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, r0, 0x0) 22:44:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x40000, &(0x7f0000000100)={0xa, 0x4e27, 0x0, @loopback}, 0x1c) 22:44:01 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$P9_RREAD(r1, &(0x7f0000000580)=ANY=[], 0x100b) [ 647.718066][ T36] audit: type=1326 audit(1622501041.467:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17782 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f00000000c0)) 22:44:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x80, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 22:44:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RLINK(r1, 0x0, 0x0) 22:44:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 648.553463][ T36] audit: type=1326 audit(1622501042.297:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17782 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockname$inet6(r1, 0x0, &(0x7f0000000080)) 22:44:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xa00d00}, {0x2}, {0x6}]}) 22:44:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000000), 0x4) 22:44:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x60080, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c) 22:44:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000000200), 0x4) [ 649.152137][ T36] audit: type=1326 audit(1622501042.897:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17811 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, 0x0, 0x0) 22:44:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, 0x0, 0x0) 22:44:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockname$inet6(r0, 0x0, 0x0) 22:44:03 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000040)='*', 0x1, 0x4090, &(0x7f0000000000)={0xa, 0x4622, 0x0, @dev}, 0x1c) [ 649.989894][ T36] audit: type=1326 audit(1622501043.737:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17811 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 22:44:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f00000000c0)) 22:44:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xc00000}, {0x2}, {0x6}]}) 22:44:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_int(r1, 0x29, 0x0, 0x0, 0x0) 22:44:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:04 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, 0x0, 0x0) 22:44:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000f80)) [ 650.721342][ T36] audit: type=1326 audit(1622501044.467:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17843 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:44:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000000), 0x4) 22:44:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x15) 22:44:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)) 22:44:05 executing program 4: r0 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000001680), &(0x7f00000016c0)=0x4) [ 651.541621][ T36] audit: type=1326 audit(1622501045.287:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17843 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xe00000}, {0x2}, {0x6}]}) 22:44:05 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) fgetxattr(r0, &(0x7f0000000000)=@random={'user.', 'oom_adj\x00'}, 0x0, 0x0) 22:44:05 executing program 2: syz_mount_image$ocfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x24, &(0x7f0000000200)=[{&(0x7f0000010000)="02020202020202027468697320697320616e206f6366733220766f6c756d650002020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d6500020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d65000202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d650002020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202024f43465356320000ced0f6a3ffffffff0000000010000000000000000000000000000000000000000000000031000000000000000000000047c3655f0000000047c3655f00000000000000000000000002000000000000000000000000000000ced0f6a300"/1152, 0x480}, {&(0x7f0000010500)="00005a0000001400000000000000000047c3655f00000000000000000300000058b70000010000000110000000000000021000000000000009000000140000000100000007aa2f42000800"/96, 0x60, 0x4c0}, {&(0x7f0000010600)="00000000000000000000000000000000a9b7ea581a6643669c7ce54eb675c2a8000000000000000000000000000000000000000000000000000100001752f5cea071f700483de78000"/96, 0x60, 0x540}, {&(0x7f0000010700)="47524f5550303100c001100000000000ced0f6a30000000000000000000000000710000000000000000800000000000000000000000000000000000000000000ffff00"/96, 0x60, 0x100000}, {&(0x7f0000010800)="47524f5550303100c0010008f2070000ced0f6a30000000000000000000000000410000000000000001000000000000000000000000000000000000000000000ff3f00"/96, 0x60, 0x200000}, {&(0x7f0000010900)="494e4f4445303100ced0f6a3ffff0100000000000000000000000000000000003801000000000000ed4103001100000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000001100000000000000000000000000000ced0f6a300000000000000000000000000000000000001000000000000000000", 0x80, 0x200200}, {&(0x7f0000010a00)="38010000000000000110000000000000100001022e0000000110000000000000100002022e2e0000017800000000000018010a026c6f73742b666f756e640000", 0x40, 0x2002c0}, {&(0x7f0000010b00)="494e4f4445303100ced0f6a3ffff0200000000000100000000000000000000000002000000000000ed4103001100000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000002100000000000000000000000000000ced0f6a300"/128, 0x80, 0x200400}, {&(0x7f0000010c00)="0000130001000000000000000000000000000000010000000018000000000000", 0x20, 0x2004c0}, {&(0x7f0000010d00)="494e4f4445303100ced0f6a3ffff0300000000000000000000000000000000000000000000000000a48101001100000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000003100000000000000000000000000000ced0f6a300"/128, 0x80, 0x200600}, {&(0x7f0000010e00)="00001300"/32, 0x20, 0x2006c0}, {&(0x7f0000010f00)="494e4f4445303100ced0f6a3ffff0400000000000100000000000000000000000000100000000000a48101009104000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000004100000000000000000000000000000ced0f6a300"/128, 0x80, 0x200800}, {&(0x7f0000011000)="0000000000000000000000000000000000000000000000000e0000000008000001000008130001000000000000000000f2070000000800000010000000000000", 0x40, 0x2008a0}, {&(0x7f0000011100)="494e4f4445303100ced0f6a3ffff0500000000000100000000000000000000000000100000000000a48101001100000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000005100000000000000000000000000000ced0f6a300"/128, 0x80, 0x200a00}, {&(0x7f0000011200)="0000130001000000000000000000000000000000010000000070000000000000", 0x20, 0x200ac0}, {&(0x7f0000011300)="494e4f4445303100ced0f6a3ffff0600000000000100000000000000000000000000020000000000a48101001102000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000006100000000000000000000000000000ced0f6a300"/128, 0x80, 0x200c00}, {&(0x7f0000011400)="0000130001000000000000000000000000000000010000000020000000000000", 0x20, 0x200cc0}, {&(0x7f0000011500)="494e4f4445303100ced0f6a3ffff0700000000001000000000000000000000000000000100000000a48101009104000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000007100000000000000000000000000000ced0f6a300"/128, 0x80, 0x200e00}, {&(0x7f0000011600)="0000000000000000000000000000000000000000000000001000000010000000000e010013000100000000000000000000000000100000000008000000000000", 0x40, 0x200ea0}, {&(0x7f0000011700)="494e4f4445303100ced0f6a3ffff0800000000000000000000000000000000003801000000000000ed4102001100000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000008100000000000000000000000000000ced0f6a300000000000000000000000000000000000001000000000000000000", 0x80, 0x201000}, {&(0x7f0000011800)="38010000000000000810000000000000100001022e0000000210000000000000280102022e2e00"/64, 0x40, 0x2010c0}, {&(0x7f0000011900)="494e4f4445303100ced0f6a3ffff0900000000000000000000000000000000000000000000000000a48101009104000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000009100000000000000000000000000000ced0f6a300"/128, 0x80, 0x201200}, {&(0x7f0000011a00)="010000081300"/32, 0x20, 0x2012c0}, {&(0x7f0000011b00)="494e4f4445303100ced0f6a3ffff0a00000000000100000000000000000000000000100000000000a48101009104000047c3655f0000000047c3655f0000000047c3655f0000000000000000000000000a100000000000000000000000000000ced0f6a300"/128, 0x80, 0x201400}, {&(0x7f0000011c00)="000000000000000000000000000000000000000000000000020000000008000001000008130001000000000000000000fe070000000800000078000000000000", 0x40, 0x2014a0}, {&(0x7f0000011d00)="494e4f4445303100ced0f6a3ffff0b00000000000900000000000000000000000000900000000000a48101001101000047c3655f0000000047c3655f0000000047c3655f0000000000000000000000000b100000000000000000000000000000ced0f6a300"/128, 0x80, 0x201600}, {&(0x7f0000011e00)="0000130001000000000000000000000000000000090000000028000000000000", 0x20, 0x2016c0}, {&(0x7f0000011f00)="494e4f4445303100ced0f6a3ffff0c00000000000000000000000000000000000000000000000000a4810100d100000047c3655f0000000047c3655f0000000047c3655f0000000000000000000000000c100000000000000000000000000000ced0f6a300"/128, 0x80, 0x201800}, {&(0x7f0000012000)="00000000300100"/32, 0x20, 0x2018c0}, {&(0x7f0000012100)="494e4f4445303100ced0f6a3ffff0d00000000000000000000000000000000000000000000000000a48101001108000047c3655f0000000047c3655f0000000047c3655f0000000000000000000000000d100000000000000000000000000000ced0f6a300"/128, 0x80, 0x201a00}, {&(0x7f0000012200)='\'\x00'/32, 0x20, 0x201ac0}, {&(0x7f0000012300)="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"/352, 0x160, 0x300000}, {&(0x7f0000012500)="0000000000000000400000000000000044495254524c3100000000000000000000000000000000000018000000000000021000"/64, 0x40, 0x3001c0}, {&(0x7f0000012600)="c03b39980000000400000000000002000000480000000002000000010000000100000000000000000000000200000000a9b7ea581a6643669c7ce54eb675c2a80000000100"/96, 0x60, 0x500000}, {&(0x7f0000012700)="47524f555030310000010008fe070000ced0f6a30000000000000000000000000a100000000000000078000000000000000000000000000000000000000000000300"/96, 0x60, 0xf00000}, {&(0x7f0000012800)="494e4f4445303100ced0f6a300000100000000000000000000000000000000003801000000000000ed4102000100000048c3655f0000000048c3655f0000000048c3655f00000000000000000000000001780000000000000000000000000000ced0f6a3000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000078000000000000000000000000000000000000000000000000000000000000000000000000000038010000000000000178000000000000100001022e0000000110000000000000280102022e2e00"/256, 0x100, 0xf00200}], 0x0, &(0x7f0000012900)) 22:44:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 652.103458][ T36] audit: type=1326 audit(1622501045.847:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17873 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0xffffffffffffff94) 22:44:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$cgroup_int(r1, 0x0, 0x0) 22:44:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 22:44:06 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) 22:44:06 executing program 4: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) renameat2(r0, &(0x7f0000000700)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 22:44:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000ec0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={0x0}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000015c0), 0xffffffffffffffff) [ 652.930479][ T36] audit: type=1326 audit(1622501046.677:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17873 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:06 executing program 3: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wlan0\x00'}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x20040004) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000008c0)) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000c00)={'syztnl2\x00', &(0x7f0000000b80)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x0, 0x3, 0x20, @private2, @empty, 0x40}}) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000d80)) 22:44:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xe00800}, {0x2}, {0x6}]}) 22:44:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000270008000f80100200040000000000000000000800029e3286cf153595a4b414c4c4552202046415431362020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ffffffff078000ffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8fffffff0ffffffff078000ffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="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", 0x120, 0x600}, {&(0x7f0000010500)="2e20202020202020202020100094e970325132510000e97032510300000000002e2e202020202020202020100094e970325132510000e970325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200094e970325132510000e970325104001a040000", 0x80, 0x2400}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x3400}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0x4400}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x8400}], 0x0, &(0x7f0000010d00)) 22:44:07 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000f41f00000b2000000a00000000000000002000000004000073564d38840300001e000000000000000020ec07020001005265497345724673000000000300000002000100000000000100000003000000000000000000000000000000000000000000000000000000000000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0f00"/1056, 0x420, 0x12000}, {&(0x7f0000010600)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1800, 0x12800}, {&(0x7f0000011e00)="0000000000000000000000000a00000000000000002000000004000073564d38840300001e00"/64, 0x40, 0x4014000}, {&(0x7f0000011f00)="01000200751f0000000000000000000000000000000000000100000002000000000000000000000000002000e01f0000010000000200000001000000f401000002002300bd1f00"/96, 0x60, 0x4016000}, {&(0x7f0000012000)="000000000000000000000000000000000000000000000000000000000001000000010000000200000022000400020000000000000001000000200004002e2e2eed4103005cf9535f230000003bc1655f3bc1655f3bc1655f01000000ffffffff", 0x60, 0x4017fa0}], 0x0, &(0x7f0000012100)) 22:44:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 653.585325][ T36] audit: type=1326 audit(1622501047.337:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17904 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000140)='1', 0x1}], 0x1) 22:44:07 executing program 2: syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) 22:44:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) [ 654.254869][T17920] loop4: detected capacity change from 0 to 262527 [ 654.266371][T17921] syz-executor.5 (17921): /proc/17919/oom_adj is deprecated, please use /proc/17919/oom_score_adj instead. [ 654.324004][T17920] REISERFS warning (device loop4): sh-2011 read_super_block: can't find a reiserfs filesystem on (dev loop4, block 16, size 4096) [ 654.338331][T17920] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 654.445430][ T36] audit: type=1326 audit(1622501048.187:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17904 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 654.493411][T17920] loop4: detected capacity change from 0 to 262527 [ 654.532552][T17920] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue 22:44:08 executing program 5: socketpair(0xc00, 0x0, 0x0, &(0x7f0000000740)) 22:44:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x1000000}, {0x2}, {0x6}]}) 22:44:08 executing program 2: sendmsg$qrtr(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x38) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_TIOCOUTQ(r0, 0x5411, &(0x7f00000022c0)) 22:44:08 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast1, @dev, @dev}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @remote}, 0xc) 22:44:08 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000003280), 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, 0x0, 0x0) 22:44:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x800, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000200)}, {0x0}, {0x0, 0x0, 0x3}], 0x0, &(0x7f0000001340)={[], [{@fsname={'fsname', 0x3d, '\\'}}]}) [ 655.216173][ T36] audit: type=1326 audit(1622501048.967:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17941 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:09 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000ec0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001380), r0) [ 655.475170][T17951] loop3: detected capacity change from 0 to 4 [ 655.526606][T17951] erofs: Unknown parameter 'fsname' 22:44:09 executing program 5: socket$pptp(0x18, 0x1, 0x2) socketpair(0x1d, 0x0, 0x0, &(0x7f0000000900)) 22:44:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 655.597167][T17951] loop3: detected capacity change from 0 to 4 [ 655.669241][T17951] erofs: Unknown parameter 'fsname' 22:44:09 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={0x0}, 0x10) socketpair(0x28, 0x0, 0xbbc, &(0x7f0000000380)) 22:44:09 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) 22:44:09 executing program 3: socketpair(0x9, 0x0, 0x0, &(0x7f0000000100)) syz_open_dev$sg(&(0x7f0000000340), 0x7, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) [ 656.038888][ T36] audit: type=1326 audit(1622501049.788:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17941 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 656.202127][T17964] can: request_module (can-proto-0) failed. [ 656.227192][T17964] can: request_module (can-proto-0) failed. 22:44:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x2000000}, {0x2}, {0x6}]}) 22:44:10 executing program 4: mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$usbfs(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000001480)) 22:44:10 executing program 5: io_uring_setup(0x6f6a, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3}) [ 656.689528][ T36] audit: type=1326 audit(1622501050.438:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17982 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0x0, 0x0) 22:44:10 executing program 3: socket$pptp(0x18, 0x1, 0x2) socketpair(0x0, 0x0, 0x0, 0x0) 22:44:10 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000002c00), 0x4) 22:44:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:10 executing program 4: syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x10420, &(0x7f0000001340)) 22:44:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000d40)={&(0x7f0000000140), 0xc, &(0x7f0000000d00)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 22:44:11 executing program 3: add_key$fscrypt_provisioning(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) [ 657.522480][ T36] audit: type=1326 audit(1622501051.268:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17982 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:11 executing program 5: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) socket$pptp(0x18, 0x1, 0x2) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wlan0\x00'}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000008c0)) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) socketpair(0x1d, 0x2, 0x9, &(0x7f0000000900)) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000c00)={'syztnl2\x00', &(0x7f0000000b80)={'syztnl1\x00', 0x0, 0x2f, 0x1, 0x3, 0x3, 0x20, @private2, @empty, 0x40, 0x7}}) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000d80)) 22:44:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x3000000}, {0x2}, {0x6}]}) 22:44:11 executing program 4: syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x200) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) 22:44:11 executing program 2: syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000041c0), 0xffffffffffffffff) 22:44:11 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000ec0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) [ 658.228233][ T36] audit: type=1326 audit(1622501051.978:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18021 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:12 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 22:44:12 executing program 4: syz_open_dev$admmidi(&(0x7f0000000600), 0x0, 0x400080) 22:44:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={0x0}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000015c0), 0xffffffffffffffff) 22:44:12 executing program 2: io_uring_setup(0x6f6a, &(0x7f0000000780)) 22:44:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000180), 0x0, 0x0, 0x1, &(0x7f00000012c0)=[{&(0x7f0000000200)="c1", 0x1}], 0x0, &(0x7f0000001340)) 22:44:12 executing program 4: syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x800, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001340)) [ 659.065868][ T36] audit: type=1326 audit(1622501052.818:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18021 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:13 executing program 3: syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002200)={&(0x7f0000001d00), 0xc, &(0x7f00000021c0)={&(0x7f0000001ec0)={0x14}, 0x14}}, 0x0) 22:44:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x4000000}, {0x2}, {0x6}]}) 22:44:13 executing program 2: syz_mount_image$erofs(&(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f00000012c0), 0x0, 0x0) 22:44:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000001480)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001440)={&(0x7f00000013c0)={0x14}, 0x14}}, 0x0) [ 659.566631][T18056] loop4: detected capacity change from 0 to 4 [ 659.606853][T18056] erofs: (device loop4): erofs_read_superblock: cannot find valid erofs superblock [ 659.679815][T18056] loop4: detected capacity change from 0 to 4 [ 659.699023][T18056] erofs: (device loop4): erofs_read_superblock: cannot find valid erofs superblock [ 659.846236][ T36] audit: type=1326 audit(1622501053.598:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18067 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:13 executing program 4: getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) 22:44:13 executing program 3: socketpair(0x2, 0x0, 0x6f8, &(0x7f0000000740)) 22:44:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffce553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) socket$kcm(0x10, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) 22:44:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:14 executing program 5: socketpair(0x23, 0x0, 0x0, &(0x7f0000000040)) 22:44:14 executing program 3: socket(0x2, 0x6, 0x0) [ 660.668967][ T36] audit: type=1326 audit(1622501054.418:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18067 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000002100)={0x0, 0x0, &(0x7f00000020c0)={0x0}}, 0x1) 22:44:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x5000000}, {0x2}, {0x6}]}) 22:44:14 executing program 5: mknodat$loop(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x1) 22:44:14 executing program 2: syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)) 22:44:15 executing program 4: r0 = syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) socket$pptp(0x18, 0x1, 0x2) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wlan0\x00'}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000000780)=0x23b) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x2c, r0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x20040004) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000008c0)) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) socketpair(0x1d, 0x2, 0x9, &(0x7f0000000900)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000c00)={'syztnl2\x00', &(0x7f0000000b80)={'syztnl1\x00', 0x0, 0x2f, 0x1, 0x3, 0x3, 0x20, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, 0x40, 0x7, 0x0, 0x1}}) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000d80)) 22:44:15 executing program 3: syz_mount_image$udf(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x400000000000000, 0x0, &(0x7f0000000880), 0x0, &(0x7f0000000940)={[{@gid_forget}]}) [ 661.427823][ T36] audit: type=1326 audit(1622501055.178:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18101 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:15 executing program 5: read(0xffffffffffffffff, &(0x7f0000000000)=""/118, 0x76) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) dup(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x1, 0x9, 0x1, 0x75037e75, 0x4, [{0x6, 0x0, 0x1fe0000000, '\x00', 0x400}, {0x9, 0x3f, 0x100, '\x00', 0x1000}, {0x1, 0x7ff, 0x80000000, '\x00', 0x58e7f2977a9da1cc}, {0x391b, 0x9, 0x3f, '\x00', 0x4}]}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x101001, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000002c0), 0x3, 0x88302) mknodat$loop(r2, &(0x7f0000000300)='./file0\x00', 0x40, 0x1) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r3, 0x113, 0x4, &(0x7f0000000340), 0x4) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) fcntl$getown(r1, 0x9) socketpair(0x28, 0x7, 0xbbc, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$nl_route_sched(r4, &(0x7f0000000700)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000006c0)={&(0x7f00000004c0)=@delchain={0x1e0, 0x65, 0xe02, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xb, 0xd}, {0xa, 0xfff3}, {0x7, 0xfff1}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}, @TCA_CHAIN={0x8, 0xb, 0x80000001}, @TCA_CHAIN={0x8, 0xb, 0xf17}, @TCA_CHAIN={0x8, 0xb, 0x9}, @filter_kind_options=@f_u32={{0x8}, {0x18c, 0x2, [@TCA_U32_CLASSID={0x8, 0x1, {0x4, 0x10}}, @TCA_U32_INDEV={0x14, 0x8, 'bridge_slave_0\x00'}, @TCA_U32_INDEV={0x14, 0x8, 'ip6_vti0\x00'}, @TCA_U32_FLAGS={0x8, 0xb, 0x5}, @TCA_U32_INDEV={0x14, 0x8, 'ip6gre0\x00'}, @TCA_U32_SEL={0x134, 0x5, {0xb, 0x5, 0x20, 0x5, 0x5, 0x4, 0x0, 0x9, [{0x8adf, 0xfffffffd, 0x800, 0x9}, {0xff, 0x8000, 0x5c}, {0xffff0e1a, 0x67b, 0xffff, 0xc250}, {0x8000, 0x7, 0x1, 0x7fffffff}, {0xffffffff, 0xffffffff, 0x1f, 0x2}, {0x9, 0xf, 0x3, 0x3}, {0x401, 0x0, 0x7, 0x1376}, {0x10000, 0x7, 0x100, 0x65}, {0x7, 0x8, 0x7fffffff, 0x7fff}, {0x1ff, 0xffffffff, 0x3, 0xef3}, {0x8e, 0x4, 0x0, 0x5}, {0x7, 0x3, 0x2, 0x1f}, {0x7f, 0x7, 0xff, 0x6}, {0x400, 0x4, 0x9, 0xffffffff}, {0x6, 0x1f, 0x6, 0x401}, {0x1000, 0x1, 0x3}, {0x0, 0x4, 0x0, 0x401}, {0x2, 0x4cbdf723, 0xffff, 0x7}]}}, @TCA_U32_CLASSID={0x8, 0x1, {0x0, 0x5}}]}}, @TCA_RATE={0x6, 0x5, {0x3, 0x1}}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x4000}, 0xc0) io_uring_setup(0x6f6a, &(0x7f0000000780)={0x0, 0x82cb, 0x20, 0x3, 0x1b7}) 22:44:15 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x101001, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_open_dev$mouse(&(0x7f00000002c0), 0x3, 0x88302) [ 662.059175][T18112] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 662.067251][T18112] UDF-fs: Scanning with blocksize 512 failed [ 662.077804][T18112] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 662.085943][T18112] UDF-fs: Scanning with blocksize 1024 failed [ 662.097022][T18112] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 662.104946][T18112] UDF-fs: Scanning with blocksize 2048 failed [ 662.150211][T18112] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 662.158248][T18112] UDF-fs: Scanning with blocksize 4096 failed [ 662.255268][ T36] audit: type=1326 audit(1622501056.008:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18101 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 662.347091][T18112] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 662.355019][T18112] UDF-fs: Scanning with blocksize 512 failed [ 662.484732][T18112] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 662.492760][T18112] UDF-fs: Scanning with blocksize 1024 failed 22:44:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_INTERFACE(r0, 0x0, 0x0) 22:44:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x6000000}, {0x2}, {0x6}]}) [ 662.660372][T18112] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 662.668250][T18112] UDF-fs: Scanning with blocksize 2048 failed [ 662.749938][T18112] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 662.757963][T18112] UDF-fs: Scanning with blocksize 4096 failed 22:44:16 executing program 2: shmget(0x1, 0x4000, 0x78000000, &(0x7f0000ffb000/0x4000)=nil) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000000, 0x100010, 0xffffffffffffffff, 0x6) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000000000)=0x3, 0x0, 0x4) mmap$usbfs(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, &(0x7f0000000040)) syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x800, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="f70d00580d59c35777620f110e06223a4c479687847d5252d0b487bff0b5d8dcc93a6e3b3c9d723a971e44e2a06585ca98761b25078c97dcaf51f8868d", 0x3d, 0x9}, {&(0x7f0000001240)="07da2426b777658e996db5a9ed9cd15dc8e155fa3bc7c6b2805f8fcfcf5ff39503673fa413255ea1dceb2067ca4f4f54bd9db896b810c4598b6431c2fbd303a2721b5033d504808b0044900d21431d1b5ebc8fd932e3a9463fb27e3e4bb421a1b58b45d5d8c31e57d943c4d3c61b43bf99e473e5ffdad0ca1a1d0fe4784fd0", 0x7f, 0x3}], 0x10420, &(0x7f0000001340)={[], [{@fsname={'fsname', 0x3d, '\\'}}]}) 22:44:16 executing program 5: shmget(0x1, 0x4000, 0x78000000, &(0x7f0000ffb000/0x4000)=nil) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000000, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000)=0x3, 0x0, 0x4) ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, &(0x7f0000000040)) syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x800, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="f70d00580d59c35777620f110e06223a4c479687847d5252d0b487bff0b5d8dcc93a6e3b3c9d723a971e44e2a06585ca98761b25078c97dcaf51f8868d", 0x3d, 0x9}, {&(0x7f0000001240)="07da2426b777658e996db5a9ed9cd15dc8e155fa3bc7c6b2805f8fcfcf5ff39503673fa413255ea1dceb2067ca4f4f54bd9db896b810c4598b6431c2fbd303a2721b5033d504808b0044900d21431d1b5ebc8fd932e3a9463fb27e3e4bb421a1b58b45d5d8c31e57d943c4d3c61b43bf99e473e5ffdad0ca1a1d0fe4784fd0", 0x7f, 0x3}], 0x10420, &(0x7f0000001340)={[], [{@fsname={'fsname', 0x3d, '\\'}}]}) [ 663.001032][ T36] audit: type=1326 audit(1622501056.748:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18135 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:16 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000ec0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 22:44:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:17 executing program 4: socketpair(0xb, 0x0, 0x0, &(0x7f0000000680)) [ 663.311584][T18142] loop5: detected capacity change from 0 to 8 [ 663.384989][T18148] loop5: detected capacity change from 0 to 8 22:44:17 executing program 2: clock_adjtime(0x5, &(0x7f0000000500)) 22:44:17 executing program 5: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 22:44:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) [ 663.834230][ T36] audit: type=1326 audit(1622501057.578:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18135 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:17 executing program 3: syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f00000012c0)=[{&(0x7f0000000200)="c1", 0x1}], 0x0, 0x0) 22:44:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x7000000}, {0x2}, {0x6}]}) 22:44:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, 0x0) 22:44:18 executing program 5: io_uring_setup(0x6f6a, &(0x7f0000000780)={0x0, 0x0, 0x20}) 22:44:18 executing program 4: socketpair(0x201, 0x0, 0x0, &(0x7f0000000740)) [ 664.452498][ T36] audit: type=1326 audit(1622501058.198:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18172 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:18 executing program 3: syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000200)="c1e3d529d8e72749afa10bb66a08b9d6c20fb328bd58913cefef65a568acd1192d9443eb651c566cae8c6158174b51052997a755f1929ff474a86ea6b7ccdb87570583ca6b3ab99fae3814552383c999ab6c59e7e53e8f57af0dfe1e98b367e747bd8aa68d869e17f68ca575e95af93df846e29b44fdb30bb9b0ad2b7d3c9a2fbabbf130c8113f7fa2973ae7dd9c18fdd0a29b4db01635e3288df54bfc3a31c21a92ef3db9c2077158af1ebf2494e06717666ec389c963b09a083ab9abe72db82b2c1714f4253c4208dbc51752a30d4f0dc67259eaeab60f67fb9542b8be029057ef0de23bb4c07f7a330be647b51b698e269ac7944b249fc1036e21d7f5fc633fa7269a87772ef85bbb62509c39ea7aacb5d41e0f00f2bd4ec6fb34b41fd456511a7389fb32f80edc0f0fab454ff19ba06b2d2dd9cc20072203e9fbc2dcb3544e7048005805e50441ef721513ce4a4ce917c43f250907812dbec7adcb33d131f33e469d920f5feafc6f30bbd6fa5d38bd2bebb1040e0f9ec06170a81712e2c51b6a1882d01a1291db52d5cc8f158e7efe2d829a0d752ab0c01afed61d262a4ba73243d1b688429f335968753da1a672bcd5a4cbdb0ccbe8821ca3efc5dc8cd718c143b26d441c388653e6afabdc825609a109130d1454b2e14959ca975259e3ae5f85484b3e977a56432d2cc917daf9ee253233d92a7d633ea9ddb0d7b5d4a1bf6912f8eb1daab941a16da53f4425ffe44606b3c970ab1e7a2d81243ac2db1afdc1e82852391274771235ae5713093e226a5e10f8e602b614df66c2b0f585e7a1bcc645f481a5be099a0cc8a5ee45bd3f8cfa5b824b8cfb8ef9085b27ab490c2fbf419c274d52b622397531b5850a9441a76603f5234b4eda61149968a8138acd011751cd5a7bbd2a21ba87f369180c5dc3bf0a14700f873949f98d996b9de68381f8eed5c615d9e8d46f215ae7bfd6b70119290f46dff2ad31780129a589ed2f467b31517a24c17528918d49be19841efb5d87b02150d6e8347f63ec450b3d11fad1d2244c94f64a1c303666b050298649ac355f8022c0074c8e2a67fbd9f48cdd62ecf6e19cd6135c680145b81deb082d2c9cc24ecd45c17c5a198c6cfc512cfc5bfbd805b2b3f94044d4c74811e8e0701ad31309487a700d55ee6c59a4602e304d9ac5b8667cea1fc5ae78cb5e140d3b845a91182067c278bce3bda1518564662682d3b143e7b6f14aa4951226f5c104de519d190aa07c1e6e2a5089db5baeb4316136ee32285eea0d59e95a43b4f6fa2ef11ded619dc1131d7d64a6be667ca5c31810fa745076ab5f0c5be3b786fe48c11ef7dd474298b0823a552b18b314fd9eac386e30db61deed4efb86dd46191bf77f406018e423e6d0a99f2c8435ef377d2ea2c3b22b28bd000f797bc3096b9495de474ffc541148f24e5d90fbf75cc91a62bea120561970c2cccb0d6d96ca30a93ef9c2ca1ef2b64c2dddd19035ad4be09ae0df875499a72b06f60fc306f3350f68102db794fd530adc27212cbf4866b96611ab839fbd9d391e0546539286606427c5431ca525c7d09d634c6c1d7d20346f783bd261082f1dfb27e3a136cb6b1aeff27ecfbe1438168566702c23b7a92d308ab08e81b3b2ccc53e5ac8fec60dc4294838a44607c4adbd4e6e41e471bd3f2272c3ab6b38cddbc26baa63fef3760145649cf5034a7e0786b7a4efe74640e5e86b4993697c0ee138bf5fc0595b7b0194d083bd0b3d767756f60e11aa47306cc5dabb1e4206de6ec413b838e1f8af41929eb14aec75214b997a1662478b63826aa55c28e529806a4d351c67b2f875f229a89d94cd889171eb7155fa9ddc4662fab81d843f47844495ecf756ae300bd291bb30b56f88180b184b014cd401c40733b4a42402b12e8a718c774ab208f49c18e6336b8aec4cc8a01adf3bdf70e94d5a08611930028dc816568138754baabcf6be468193dd6349aa682434cd322667f3f5a532c9ff590cdecd78580c94d17c4139d32afe8f09a0391fe2baf62e14a789e2aeb48f66cd732589ad824f20f518d13b932a6de4f4b19964bd2fc8641af9d4f7a884abf494239c98de9ab0ec2491820276ea1088ea3832c29bbb6e0e8cdd378302ac1bf54bcf60b039c308a576218ab33c58df56235bd26ad11eb487bbc7528c1301c198d42da67c329d608f4c817a47ec9fc195abbbbf794ed07bb097222b98d979f5ac75e06c724f9c14b8d4c5a25bd002a726182de4c2702d46e5ae3a75556e5cdd2d892884940f0bb86896a34f83b1f9354aa37ce701876ea67b22575aba078a85faae1894ad877505101927461dd3800ce74ebba5e8e6b6e6c02c459cd6459a1a3a09693fb92b2b2802428f7820ad3a2f1c0a3533fff937a0724d378eecbd72e79cc827a67f72744157923b6dcdff54da56376ad771f5cb006f5465900c0df5329d02f0d97d05f4fa347e0aeb53c66699e40a19890cc402525a19551c3290f89ec354af778c8a99827cd2b625702849b3e0a2081ecff21e34c6e498934d5ea791ad32e6c77ccecf122b88012cee81164b3f9f5be54b6c19e4a17435edc4db561ccf77e47a1f39a72bf6b12cf2ae55e5b66b23ccd67a83fae44424999f5d7a13098594dc419cfa5225f52740d8269f5bd1ff7922a39bf656971beb0049acac9622b6b5f1b103693a671c6e4c00f74ed512176b9a8ae9a824524c7214df63a113c8902be4a79d3f94e7f193be00cd8cb523334522b54105002cec0a76431d45afeb5da67bc1ab49ac40950f651ec258475f3365684285bb51e52aa4ed44cee62f56671e4dc058aa6a17aa2c4b23d68ea0d396e7ac58feb2d227219b71ff91859066f2f0e8e70265d19624d65b8fef5c8f87a7638ecf594780c896235c98d424b7b08053c891cc51413e2adeb5d42677cc8b865ecb4a84ac96342c245df9d4732d0ae0623cf3c4e61c060833f63764aeecdf0608aaa616daa8b6b8d3e9b0f55a71da013b847c103e8c9f5a65ae4cdbb659692de1674712bbafd9e1bd79cdeb2860f3a52d209fd53957e6e49d6548354c6d2cce71746affd4e4eaff3e99e5da70438188f7d70cd986bddd26111470b0664939e0be0fa618ca857a962b08136f2969e3ac5bcab7c44dbe68c2905af9f4167bfa8fda8d7c491af02763ed691f264cdd420d4cf916c9fbc161fe51ea0a174ff217a423c436a70f902b44efc9226971a8dbdcff26658429dad569b01392adcbb5ac702724e7e1390644e45c65474c62442c4fcf090e41ce88d85ad291299828ff0ee7eb2b3a879752b0938f6fc2e11baa6a8d7638484f79a6cbb23610b0c03b0c1215faec49b8c63876205e4f28c85c4daf33b67f3730b05d24886ef959d83e0e527d0a59536e2e725284f3f9fcab8348079b13a8e415e2cddb62e3e9684f0274a09300126b0bef1df95a198b29248c683ca3b2ec94a4a700db9b2b31483bbf27afa554ce5290d46a0102c0b172eac46fcecdbdffaca16af07ba1d7042fb3cbfa685ccffe66ae1be4d954c3d907a58b3932af808b91e583810c96afed616efb5ff4aea7d6e3bfee4e0dd413314eac2a17834289ca62753bf681be02f096ae1f95dc21ffb5686b8455c7e0dff331d85db61352ebe8d0318d799c53497a279f94c17891b8118fc993b3b27c48165f10c77f672d35ac83e4f2affcdddfb3455182ee40513acf36fa22a0c8662436a13550a1fe03fde2eeaf895c5d4d7bed3f8558e4f413c185d87eb178f348e507cd7d90ee8fa6469b26a5af6c9c313ac72073780fce66675e2d90ac16f900bfdcbedb7d0d5402d0f4d75228f5262c5151f0d8116b6f454d59036f4c5db8af84db26a3ac9a29eb29d1de911c73c467b10d8d29432e9db0340411675044d1391aa4f05713be9f957c6fd49f0601c877ba0c0f5312b707a324ea8b66ca6d804b2f95c7d2b27ce7ec86b3b0697ccb751fe983e2b4f563f841522fe22dfbb68dadc71660c018034237ecb679b529ed18573bd8e847535845eddf6832ea21b5dc89bd69a0747cd6cfc48bcfdb8b8bf5b20467532eaf02df238af16b5392741df3eca6011db7f95ecb40789f535fd5f809787ab6e36debfc112627e5c327b5ce40b9b3c23aa2ca8434c31ccfc6a70789d3c5d90f9ff67d9ed67bd18023bdf860002ca0fda93c1ee39d449eb0aea63777c83011709cf9e78f224fee19ac9d8b9f15847b7a194d26c19f25c48489b3cc70e627a8ddb465b1ff1834447d3f0c036ef7b761adb811714bc9b158181af4342ca7b52382f3f2cbb452a0a8e87ac3bcff5ce203e4309cbc4f5bba90b98e3366a609ac7c78d087fa61213bbad94384d47ece35d15b6da624c431b540fed04d1d765764b1f6c92bba816011365265959a0341db31427e74808508c679714eb56c2e4c8c761ed89cd37185769b6f8fc9d998c9c535b5ff59c78521ad5454e18f89f6dcf6dd3cb03c4cd57fcbf5e00bd7b59cd9e86cab8e4124fe4ffd0ff81751a151218a34db62ce644216edd5ac995a5aba061bdc391f6775e4cb0b275464156df43de0dfe54e2c2a5e34d714d4abd146ffdeec66b2a6ed9be6922031ddc836fae8ed9172bbff71311ad461ab9d033b2bc0b9cc2e765b445341a55ecf6a23ef79a09f327f8121312040b1310f86a8c70a2e2c6691e15e70ff20b62294803ba3b9e32bad33f3bd42082b94a9139328db901f558d88a21b7d21244c4b0c986a60f898e67f435f85b1d4c17466ba52652192efaf7208a14dddea5a17dd810af16b96637bfce74196912c88292cb104d71822ed797b213ef08a18ba5d0b2a4bd90c954fb8b2481769f5bdbfc774dc3781dc4516a4a30c3dfcc83f8e0d6b826f9634c5cdf314c155f3e2996aeb2f6541e239077edbdef4d54fdfa53307a2bdb037244f0cbe6d6e0ae82246996ebd777be7d93360e1e3e1fd9d488af69fad77673480c9507759a34a2091e9ac0dba05f5047e053aa2a053ad5dc9f666def13172440ac5ff8592dbce6dd8e329bc76def3281b5079cd402f28bd3f14be844fe1be2cdf3ed25e3dd72eda4600216fa53c411dc742ce68a6274d40e303a851592d9d47f44c7746fe6b3c07cd7c395891c94ca46ecfef50472cfc70f7fc9e72cd7ed4469a4d39a4d2f5fc9319913cfbc0c6fbcdae6af3457ee018de52e18842bae640373dbf2c99f6f4f2c6ebec3af617e46ed0ad8b6385890eb6be8eb9ee750872ad849e529d7a5599d568b7499fa043bee705303806a9255640ca7367a13064a0b3f64e67530b52fdcc7122502baaa2114c7911bd19d2f4226e64afa86846c311580a70d00f57be209239e91e0ac1958e823fe91ca238e405318b448f39aa1cb21d46a6d026c5d67bb67cc10c0c53b39dcacc9fc5cb1a62cbfb36e2bdaf35e4cb430895108e59ad267d54e89d499598248c8f73df1dbfc4f07d1c752d9241a182057817b03060da6126bf72fdd809fcf631d873b405437575c7815b0e219728fcec3c1d0e6f21cfc84e2d9137adcf8253279b51c87aa036b4536d9339475f8f40019f869195a079729d5be67e7531564e0e1bc85d15b921990f6fe70f388503b04ecec84671e3c8e8946793502e542f5bd8ce178e020f83f7e7b35312617c214eaf529c94b3029067ecd1f6fb91cee16977cc193be1cf2c91ee5689ddae36d4eeeb590f6075cb1a0c8c63216f6fdc23fa9334508774b363fc1d5a79782b76440524b604b610b6fa39f81324ae7b680f5d94564e25ac05baabcb9521f413ae1064d4ef1cab8338896db41d7d7c2b6dac5fb21d3cf6f172", 0x1000}, {&(0x7f0000001200)="f70d00580d59c35777620f110e06223a4c479687847d5252d0b487bff0b5d8dcc93a6e3b3c9d723a971e44e2a06585ca98761b25078c97dcaf51f8868d", 0x3d, 0x9}, {&(0x7f0000001240)="07da2426b777658e996db5a9ed9cd15dc8e155fa3bc7c6b2805f8fcfcf5ff39503673fa413255ea1dceb2067ca4f4f54bd9db896b810c4598b6431c2fbd303a2721b5033d504808b0044900d21431d1b5ebc8fd932e3a9463fb2", 0x5a, 0x3}], 0x10420, &(0x7f0000001340)={[], [{@fsname={'fsname', 0x3d, '\\'}}]}) 22:44:18 executing program 2: syz_mount_image$erofs(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0), 0x0, 0x0) 22:44:18 executing program 5: sendmsg$qrtr(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x38) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_TIOCOUTQ(r0, 0x5411, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f0000003bc0)={&(0x7f0000003b00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000003b80)={&(0x7f0000003b40)={0x20, 0x6, 0x6, 0x301, 0x0, 0x0, {0x1}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x5}, 0x44040) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000003c40)=0xea1, &(0x7f0000003c80)=0x2) 22:44:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f0000001c40)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 665.299023][ T36] audit: type=1326 audit(1622501059.038:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18172 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 665.435575][T18191] loop3: detected capacity change from 0 to 8 22:44:19 executing program 4: syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x800, 0x1, &(0x7f00000012c0)=[{0x0}], 0x0, &(0x7f0000001340)) 22:44:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x8000000}, {0x2}, {0x6}]}) [ 665.622860][T18191] loop3: detected capacity change from 0 to 8 22:44:19 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b80)={&(0x7f0000002b00)={0x28, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 22:44:19 executing program 3: socketpair(0x1d, 0x0, 0x9, &(0x7f0000000900)) 22:44:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="f7", 0x1, 0x9}, {&(0x7f0000001240), 0x0, 0x3}], 0x10420, &(0x7f0000001340)={[], [{@fsname={'fsname', 0x3d, '\\'}}]}) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000001480)) [ 665.991642][T18210] loop4: detected capacity change from 0 to 4 22:44:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 666.257632][ T36] audit: type=1326 audit(1622501060.008:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18213 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:20 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) dup(0xffffffffffffffff) 22:44:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) [ 666.568205][T18222] loop5: detected capacity change from 0 to 8 [ 666.673031][T18222] loop5: detected capacity change from 0 to 8 22:44:20 executing program 5: setsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, 0x0, 0x0) [ 666.911718][T18210] erofs: (device loop4): erofs_read_superblock: cannot find valid erofs superblock 22:44:20 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000ec0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) connect$pptp(r0, &(0x7f0000001300)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) [ 667.084208][ T36] audit: type=1326 audit(1622501060.828:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18213 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x9000000}, {0x2}, {0x6}]}) 22:44:21 executing program 4: syz_mount_image$erofs(0x0, 0x0, 0x800, 0x1, &(0x7f00000012c0)=[{0x0}], 0x0, 0x0) 22:44:21 executing program 3: socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b80)={0x0}}, 0x0) [ 667.713510][ T36] audit: type=1326 audit(1622501061.458:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18248 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x800, 0x2, &(0x7f00000012c0)=[{0x0}, {0x0}], 0x0, &(0x7f0000001340)) 22:44:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:21 executing program 2: syz_mount_image$erofs(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)) [ 667.884949][T18252] loop4: detected capacity change from 0 to 4 [ 667.999493][T18252] loop4: detected capacity change from 0 to 4 [ 668.017434][T18262] loop5: detected capacity change from 0 to 4 [ 668.043647][T18262] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock [ 668.147364][T18262] loop5: detected capacity change from 0 to 4 22:44:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002200)={&(0x7f0000001d00), 0xc, &(0x7f00000021c0)={&(0x7f0000001ec0)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfb}, 0x14}}, 0x0) 22:44:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={0x0}}, 0x0) 22:44:22 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000002880)={'syztnl1\x00', 0x0}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000002c00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, 0x0, 0x2141) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000007ac0), 0xffffffffffffffff) [ 668.413757][T18262] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock [ 668.566080][ T36] audit: type=1326 audit(1622501062.318:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18248 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:22 executing program 5: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000740)) 22:44:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xa000000}, {0x2}, {0x6}]}) 22:44:22 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000340), 0x4) 22:44:22 executing program 4: syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x200) 22:44:22 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast1, @dev, @dev}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @local}, 0x10) [ 669.175321][ T36] audit: type=1326 audit(1622501062.928:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18285 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:23 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) syz_open_dev$dri(&(0x7f0000002b40), 0x6, 0x0) syz_open_dev$media(&(0x7f0000002b80), 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002d40), r0) 22:44:23 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) 22:44:23 executing program 4: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x2, 0x0, 0xffffffffffffffff}}) 22:44:23 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) fcntl$getown(r0, 0x9) 22:44:23 executing program 3: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 669.978949][ T36] audit: type=1326 audit(1622501063.729:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18285 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001340)={[], [{@fsname={'fsname', 0x3d, '\\'}}]}) 22:44:24 executing program 4: syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001340)) 22:44:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xb000000}, {0x2}, {0x6}]}) 22:44:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002200)={&(0x7f0000001d00), 0xc, &(0x7f00000021c0)={&(0x7f0000001ec0)={0x14}, 0x14}}, 0x4000180) 22:44:24 executing program 3: setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, 0x0, 0x0) [ 670.604312][T18318] erofs: Unknown parameter 'fsname' [ 670.616063][T18317] erofs: (device loop4): erofs_read_superblock: cannot find valid erofs superblock [ 670.688079][ T36] audit: type=1326 audit(1622501064.439:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18319 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 670.754223][T18318] erofs: Unknown parameter 'fsname' 22:44:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(0x0, r2, 0x10, r4, 0xc) 22:44:24 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x101001, 0x0) [ 670.842640][T18317] erofs: (device loop4): erofs_read_superblock: cannot find valid erofs superblock 22:44:24 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "198d98", 0x10, 0x3a, 0x0, @private1, @local, {[@srh], @ndisc_rs}}}}}, 0x0) 22:44:24 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000180)={@multicast, @remote, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "80d33c", 0x0, 0x33, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0}}}}, 0x0) 22:44:25 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x4, &(0x7f0000000080)=0x2, 0x4) [ 671.520319][ T36] audit: type=1326 audit(1622501065.269:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18319 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:25 executing program 5: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) 22:44:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xc000000}, {0x2}, {0x6}]}) 22:44:25 executing program 4: socket$pptp(0x18, 0x1, 0x2) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wlan0\x00'}) socketpair(0x1d, 0x2, 0x0, &(0x7f0000000900)) 22:44:25 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000180)={@multicast, @remote, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "80d33c", 0x0, 0x33, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0}}}}, 0x0) 22:44:25 executing program 3: sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) [ 672.130298][ T36] audit: type=1326 audit(1622501065.879:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18355 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:26 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000180)={@multicast, @remote, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "80d33c", 0x8, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, {[@srh={0x3a}]}}}}}, 0x0) [ 672.428122][T18358] can: request_module (can-proto-0) failed. 22:44:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(0x0, r2, 0x10, r4, 0xc) 22:44:26 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000180)={@multicast, @remote, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "80d33c", 0x0, 0x33, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0}}}}, 0x0) 22:44:26 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x3) 22:44:26 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "25f94e", 0x14, 0x6, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x80}}}}}}}, 0x0) 22:44:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @private1}}, 0x0, 0x0, 0x14, 0x0, "a7844e26b769b3910c521c69dda5cec62ab2ae0b4b440047e6b77ae53b5192b87b5926d6ceca1ff012d2d39907372f18c7d9120bead125826ee8621d0b1cda8eecdfdaa5fc8a47bbaacbcc4c45379394"}, 0xd8) [ 672.950664][ T36] audit: type=1326 audit(1622501066.699:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18355 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:26 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000180)={@multicast, @remote, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "80d33c", 0x0, 0x33, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0}}}}, 0x0) 22:44:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xd000000}, {0x2}, {0x6}]}) 22:44:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x0, 0x0, "acf39359ce45ca5ab12f7f1952c4bd3545d00cd08974a7b5f5e79f9eeecbb64226a082249f4dd3a82bdd2216f3f175d83d62f2a1e7464d461b3f12961eebc4c5d05f7e6f15e10f77542d3cf0ee33008c"}, 0xd8) 22:44:27 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid_for_children\x00') ppoll(&(0x7f00000001c0)=[{r0}, {r1, 0x1205}], 0x2, 0x0, 0x0, 0x0) 22:44:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$sock(r0, &(0x7f0000003240)=[{{&(0x7f0000000080)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000200)=[@txtime={{0x18}}], 0x18}}], 0x1, 0x0) [ 673.600555][ T36] audit: type=1326 audit(1622501067.349:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18384 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:27 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 22:44:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(0x0, r2, 0x10, r4, 0xc) 22:44:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0xd83b}, 0x1c) 22:44:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000005540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="0dd1d153833682d7f4bb0dd931742fbf0466338f415be4c0bc37d5ec4cb1419a928c5845b48afd504616bd9146d11f9e2d209a6729cb77cd5e56b13e83d6fb3339c3642f395987b51680a6e54c5c6fe266f186c575636642ecdb6774a0bfdd5b5745ec8bb55f44208c546f675af954c706e41b589ba57783374835dfe5ad6128c26b4f030a3fb07d23f4db82a522d7393674594c8037b4de552518784e1ec194de0723c38d91578c19c537a5011d3d4f0f0d12a74f093329db989f0dca4a3e1db4bb2c362b0c1889024f9ca92e6a0bd2d4e20d01802c9749873ff8a41ba33122bde122c8eed7ac415c8341797f159825d26c65bb90c4b72070216d8e2f2ac68aad04376e7b9afb819a30effb4046b5ac81a1c79ac3e74b50a1c403078cb09f0ca5b32c1ae52b44c730aa450d625315956dffe5414c6ad79fe06072c200a62cdb56ad93bd83226da969096e3c5ee57d385d73a963d5d016f4ffda69569ad7f2095ab4953cbfbbd354723341"], 0x100e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x80403, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000007fd}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40}, 0x0, 0x1004, r2, 0xb) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_ima(&(0x7f0000000580)='./file0\x00', &(0x7f0000000340), &(0x7f00000005c0)=@v2={0x5, 0x2, 0x8, 0x4, 0xcb, "f13506c20ad897ba41ec7ee7c59e915aac1ae6a792c80cb2f7df8c1785b4d9f6e310f62fb3b5c3b6ca775c7c73bf9c45c131036a1407dabb7a4c18f760b8e340f17a522bf0fba31f6d8bad5bc70ccb33b189e60daf39a299efb1569877144820ff5f399cdaf4bc9b6089ea3e67a31f9862fca4aaa45af0b4aebba324e3de8bd0a006ba84566533a035a69283f73b196e3a1ecaf589c084d9d8457524b83d2dee952956233840416cd4f15b457f4594241e33bf7fcea1edc84aa3c724a4a200d759b729bf59d1f9580ced8a"}, 0xd4, 0x1) 22:44:28 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 22:44:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) [ 674.421265][ T36] audit: type=1326 audit(1622501068.169:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18384 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:28 executing program 3: sched_rr_get_interval(0x0, &(0x7f0000000180)) clock_getres(0x0, &(0x7f0000000000)) 22:44:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xe000000}, {0x2}, {0x6}]}) 22:44:28 executing program 4: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x105d01) 22:44:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000700)=ANY=[@ANYBLOB="02037f095f00000026bd7000ffdbdf2502001000000004d2000004d40000000004000200c50000000800000000000000ffffff7f00000000050000000000000005000100ff0000000a004e2100000012fe880000000000000000000000000001ec000000000000000400040008000000ab5300000000000000000000000000000600000000000000210008"], 0x2f8}}, 0x0) 22:44:28 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) [ 675.173569][ T36] audit: type=1326 audit(1622501068.919:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18417 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) madvise(&(0x7f0000299000/0x3000)=nil, 0x3000, 0xf) madvise(&(0x7f00001ee000/0x400000)=nil, 0x400000, 0xf) 22:44:29 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000180)={@multicast, @remote, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "80d33c", 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0}}}}, 0x0) 22:44:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x0, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000005540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x100e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x80403, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000007fd}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40}, 0x0, 0x1004, r2, 0xb) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_ima(&(0x7f0000000580)='./file0\x00', &(0x7f0000000340), &(0x7f00000005c0)=@v2={0x5, 0x0, 0x8, 0x0, 0x58, "f13506c20ad897ba41ec7ee7c59e915aac1ae6a792c80cb2f7df8c1785b4d9f6e310f62fb3b5c3b6ca775c7c73bf9c45c131036a1407dabb7a4c18f760b8e340f17a522bf0fba31f6d8bad5bc70ccb33b189e60daf39a299"}, 0x61, 0x1) 22:44:29 executing program 4: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001f40)) socket$inet6_udp(0xa, 0x2, 0x0) syz_emit_ethernet(0x51, &(0x7f0000000080)={@local, @broadcast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "0ba880", 0x1b, 0x11, 0x0, @remote, @private1, {[], {0x4e22, 0x4e23, 0x1b, 0x0, @gue={{0x2, 0x0, 0x0, 0x0, 0x0, @val=0x80}, "a6a55874290eef6f3c576a"}}}}}}}, 0x0) 22:44:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000005540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) write(r3, &(0x7f0000000340), 0x41395527) getpgid(0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x100e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x80403, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000007fd}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40}, 0x0, 0x1004, r2, 0xb) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_ima(&(0x7f0000000580)='./file0\x00', &(0x7f0000000340), &(0x7f00000005c0)=@v2={0x5, 0x2, 0x0, 0x4, 0x3c, "f13506c20ad897ba41ec7ee7c59e915aac1ae6a792c80cb2f7df8c1785b4d9f6e310f62fb3b5c3b6ca775c7c73bf9c45c131036a1407dabb7a4c18f7"}, 0x45, 0x0) [ 676.018532][ T36] audit: type=1326 audit(1622501069.769:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18417 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:29 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000180)={@multicast, @remote, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "80d33c", 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0}}}}, 0x0) 22:44:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0xf000000}, {0x2}, {0x6}]}) 22:44:30 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 22:44:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000005540), 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) r2 = getpgid(0x0) sched_setattr(r2, &(0x7f00000000c0)={0x38, 0x5, 0x1000001a, 0xa65, 0x103, 0x4, 0xfffffffffffffffc, 0x1, 0x9}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_ima(&(0x7f0000000580)='./file0\x00', &(0x7f0000000340), &(0x7f00000005c0)=@v2={0x5, 0x2, 0x8, 0x4, 0xb3, "f13506c20ad897ba41ec7ee7c59e915aac1ae6a792c80cb2f7df8c1785b4d9f6e310f62fb3b5c3b6ca775c7c73bf9c45c131036a1407dabb7a4c18f760b8e340f17a522bf0fba31f6d8bad5bc70ccb33b189e60daf39a299efb1569877144820ff5f399cdaf4bc9b6089ea3e67a31f9862fca4aaa45af0b4aebba324e3de8bd0a006ba84566533a035a69283f73b196e3a1ecaf589c084d9d8457524b83d2dee952956233840416cd4f15b457f4594241e33bf"}, 0xbc, 0x1) [ 676.608457][ T36] audit: type=1326 audit(1622501070.359:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18451 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:30 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000180)={@multicast, @remote, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "80d33c", 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0}}}}, 0x0) 22:44:30 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000580)='./file0\x00', &(0x7f0000000340), &(0x7f00000005c0)=ANY=[@ANYBLOB="0502080000000400eef13506c20ad897ba41ec7ee7c59e915aac1ae6a792c80cb2f7df8c1785b4d9f6e310f62fb3b5c3b6ca775c7c73bf9c45c131036a1407dabb7a4c18f760b8e340f17a522bf0fba31f6d8bad5bc70ccb33b189e60daf18a299efb1769877144820ff5f399cdaf4bc9b6089ea3e67a31f9862fca4aaa45af0b4aebba324e3de8bd0a006ba84566533a035a69283f73b196e3a1ecaf589c084d9d8457524b83d2dee952956233840416cd4f15b457f4594241e33bf7fcea1edc84aa3c724a4a200d759b729bf59d1f9580ced8a46dc9cddecac2bbf41dfcfbf09a1a38d2b23a98945e7490e92d391d7f1cbab240d9220"], 0xf7, 0x0) 22:44:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x0, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:30 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000080)={@random="5178e455933a", @random="f713f517cbb5", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "12a1fd", 0x54, 0x3a, 0x0, @private1, @local, {[@dstopts={0x0, 0x1, '\x00', [@pad1, @jumbo]}], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1]}}}}}}, 0x0) 22:44:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000005540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) write(r3, &(0x7f0000000340), 0x41395527) getpgid(0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="0dd1d153833682d7f4bb0dd931742fbf0466338f415be4c0bc37d5ec4cb1419a928c5845b48afd504616bd9146d11f9e2d209a6729cb77cd5e56b13e83d6fb3339c3642f395987b51680a6e54c5c6fe266f186c575636642ecdb6774a0bfdd5b5745ec8bb55f44208c546f675af954c706e41b589ba57783374835dfe5ad6128c26b4f030a3fb07d23f4db82a522d7393674594c8037b4de552518784e1ec194de0723c38d91578c19c537a5011d3d4f0f0d12a74f09"], 0x100e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x80403, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000007fd}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40}, 0x0, 0x1004, r2, 0xb) setxattr$security_ima(&(0x7f0000000580)='./file0\x00', &(0x7f0000000340), &(0x7f00000005c0)=@v2={0x5, 0x2, 0x0, 0x4, 0xee, "f13506c20ad897ba41ec7ee7c59e915aac1ae6a792c80cb2f7df8c1785b4d9f6e310f62fb3b5c3b6ca775c7c73bf9c45c131036a1407dabb7a4c18f760b8e340f17a522bf0fba31f6d8bad5bc70ccb33b189e60daf39a299efb1569877144820ff5f399cdaf4bc9b6089ea3e67a31f9862fca4aaa45af0b4aebba324e3de8bd0a006ba84566533a035a69283f73b196e3a1ecaf589c084d9d8457524b83d2dee952956233840416cd4f15b457f4594241e33bf7fcea1edc84aa3c724a4a200d759b729bf59d1f9580ced8a46dc9cddecac2bbf41dfcfbf09a1a38d2b23a98945e7490e92d391d7f1cbab240d9220"}, 0xf7, 0x1) 22:44:31 executing program 2: io_setup(0x4, &(0x7f0000000000)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f0000000200)={0x0, 0x3938700}) [ 677.429099][ T36] audit: type=1326 audit(1622501071.179:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18451 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000140)={'macvtap0\x00'}) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 22:44:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x10000000}, {0x2}, {0x6}]}) 22:44:31 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f00000000c0), 0x2, 0x0) 22:44:31 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x20000300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 678.151520][ T36] audit: type=1326 audit(1622501071.899:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18486 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:32 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f00000002c0)='devices.allow\x00', 0x2, 0x0) 22:44:32 executing program 3: perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:44:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x0, 0x62, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x8, 0xa, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:44:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 678.988195][ T36] audit: type=1326 audit(1622501072.739:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18486 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:32 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x300, 0x0) 22:44:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001880)={0x5}, 0x40) 22:44:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x11000000}, {0x2}, {0x6}]}) 22:44:33 executing program 2: bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x700) 22:44:33 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 679.594357][ T36] audit: type=1326 audit(1622501073.339:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18520 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x0, 0x2}, 0x40) 22:44:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) 22:44:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x0, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:34 executing program 3: openat$cgroup(0xffffffffffffffff, 0xffffffffffffffff, 0x200002, 0x0) 22:44:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000031c0), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x4020940d, 0x0) 22:44:34 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids'}, {0x2d, 'pids'}]}, 0xc) [ 680.431696][ T36] audit: type=1326 audit(1622501074.179:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18520 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:34 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x40002040) 22:44:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x12000000}, {0x2}, {0x6}]}) 22:44:34 executing program 2: perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:44:34 executing program 3: perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:44:34 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 681.083056][ T36] audit: type=1326 audit(1622501074.829:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18546 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:35 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x58, &(0x7f00000005c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:44:35 executing program 2: perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:44:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x0, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:35 executing program 3: perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:44:35 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x400000e0) [ 681.943270][ T36] audit: type=1326 audit(1622501075.689:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18546 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x25000000}, {0x2}, {0x6}]}) 22:44:36 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 22:44:36 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000080)='k', 0x1}], 0x1}, 0x0) 22:44:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000031c0), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0xc020660b, 0x0) 22:44:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000031c0), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x541b, 0x0) [ 682.703237][ T36] audit: type=1326 audit(1622501076.449:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18572 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:36 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001380)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x2}, @call], &(0x7f0000000040)='GPL\x00', 0x2, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:44:36 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000012c0)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3}}, 0x10, 0x0}, 0x0) 22:44:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 22:44:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x0, 0x41, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:37 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid_for_children\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) 22:44:37 executing program 3: socketpair(0x18, 0x0, 0xfff, &(0x7f0000000040)) [ 683.502887][ T36] audit: type=1326 audit(1622501077.249:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18572 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x3f000000}, {0x2}, {0x6}]}) 22:44:37 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)=[{0x0}, {&(0x7f0000000080)="001ea17902fc9d451fe3dbb49509688d8c8ef701fed356f58ed9a240dd435b7af7d132785e5d535ddf90980da265a33a5a1f4dfd060c268cc8700d2e999b547db4c16608eeb5f0ccdf3513d7037113b7e76cb4db2f49e37270faab465210d0693211df9f4e7006b908466cdc39d03d6d9c47a5f570e2e70c7cfa8b12bc67fe", 0x7f}, {&(0x7f0000000100)="03b5e12bab690358f7463a2228d87eab63ade43a7f0446c0413a26015d07e3d37c9f5d262bdcccbb6f869455a0136981692cf02d5a6eca76c0d1abc6e8c939491ed3003b200702b31308e324041988a73fd05484cdbe35ef1f5d687c0e1be8596423292dab9f651eb82f409b32123ee73c683a7270e08322d3f8ae7943b25ea892d6d0fb4375f01f7061376689dbe5abc28571bcdfa67a66bb92d576d77c2c4f4083e153a253f56e70779d21f53480074e9affc9eb7ad957b3b33375c07b1f04f66b7ce8527786c54f390f64184ab6d876ad50efd6e33264af7c1de213e68ec42496c22812de0f4ae7b708f734a7165a705fd62a93f3daad748db280e9491706cacf8a847e2ed3c2fb0e5a62de7852beffa49ecdf0dbc29c7b99fc978dee9057c293b538d4f2e7cc31eeba0495a5753d311d063fe60e45fe7348ba7d55acd1a7e79fb40f42afa2dc455df03403be6e4c88e456681b0c1322e82395acae60d299e717c379afdf2ad744ffb7c468153c254790ed4a8d46650e1cc5b78a808bf67cb1bd9192c8d26b458b835253ccec1a61ab95ced97354880189dc52cc38b302f7b74810ae420ea249d7a94844c3a5c3764ce05ae73d53ad191430d7a600e6c3ccb159284502ad3b4e2a6522c7a4310816cf8d15495c3d38df090a1ba7e31868575178a9ed35f6c60e194585856f9f7586c6226a181da1b8b28ac4fa63722b7848d3cebd2a88738373ba16f256bb43686404d0dbb010469ee0f095aaafdf933ab8c6ee5a8f9ad010d5737f0a104e755a4532f2dd99aa45ed931283ff8b6ec7b755dd808d0df9ee55b2daad19f7ebf1f4769d58829c1bbea92eef01c5effa9e647101690f02d21e640a692245be852d0b3547cc52427ef6a06c126a0114cb4ce8b8c5a5b719265a01d495b11b589ee90d5fa8a1ebeb0093482c1636493a1d06353935abd0eee076079b0a6d0156e5c15a41c80cccde6c78fdc1a73f26565facfe289a750e0586a371654954cc09b83fceff34eccb982586d00e47d8df657a02d99aeda08858be4d5ca9404070a582c9c42bddc3358893af5c82a0efbb5c029cefb609a7750d6c130f282927e5f098f332c7e2d297a9a462ca3727ee8cb2d1db485fcf81b82d28970bee1900f9c2f9966bb06516de3172cc35c05290611df6dc397fdbf51bef77ba8fd44a1b7b3332842227b4b3ab2100d49bc93f8d2e024102f7be4627dc00caee81a53d4964a4684c5d64169f3700dd94bae0a465b9d2ac1584cec9fc04263565c2d15bcd6f96ba41891ad6cbe49d286c58751c4f2e70046f91f4ff5cb02d9aa36f8e89076a4df88c52be1d8b14ecfaf398f0bea01aafb7b85a42598b867cbd975041c05f038e6c9bd146b988bf9b4becb18d2b01de4c95afbb7fbdc67e936b91cb5b92992cac5294648430bb79fcad474ee686930da95885c17c73ee71779635f9342be8347f01c5133b96638eb360192d235901cee6d75bbfe4200b189a56e0b0f49c49b630e4d9f117ede4ca146b617615f835a7dddb62edbd290f04132839da4e06d715d1bd6c62ffa1460e39902f6c1998457fee5eabccf5f572dd3394844756e032e3e946aa66fc8e21d8ed4769ce723ae7f94437a2052352712ed2d0ee692e5fae750748075ab7c0a696af6c22f8d5555a58dd5e7196679a64d9dd8b7d1e332236471962f9e62e4d82f9ccec44d15e904ef765ec5dfe53282d8ee60a5ffe0112045e9fdcc3eda20eabce04725e0462acc173cfdb555497ec70a1e6f54dc0473f46597c35a20e6320a8b17f26b4bde291dcd34ab288ce993001aa5972b4e3595387e9f36ab3c68a8940ccdef094f7a173513f932b00edadb1a4681556d17e7678260b8626a55af3d1eca43e2026eff7cd7caf3032bd74dfb7753d8961c80ab65669da2aa6a08dca805f9797c385bb7b3ec134186dac226ca617537a4ca05896417e3517e19172afc88c1b82955fbb6f446ce5b4c48e0a367d474f00845357e87233aaf2daa3536b3a30a3a19e06afbbbfc0cb6ce4818636acdc960d69fcf643f0d08d8a6180994b1a4586d9b226465ec05038891c5ab72c562982c3ba6ee90ea8f4f360b149c215f25f2d6b7bc540a267cbd70bb56191b79f12d2036a35305f2f1c572e11646f2b63d10dca524ec2dd966eb75eecc7970ec0d1d64c22964347eafc29ccd60446eb2545eda54d0ba4a2fa6e36a0abc5f51f1510bc8a7640d5b70077e0ab2ffd47a6357040b401085faa785673a035e12418b950800fcfec828191f92801c59642a49b3072ead0b0ae9049641233af671c01b8f2d62ecdbdb9e763724036dd81e7b9cf35cab39379c4b29710650c73a07692bae0277162455358b8fb9cc98db6a6f71b485cba61fa694f1e1a108654c8607d7a3e43cbdb7955b593d59288d94780277cba15273dd6158f886fbeec352e758ebdf8791a5efa7c2790a33a7e348356464d2e16ca2c89e024f6a1392a02b76d14862131fe5ae4f49f51ddd31f120f18525d35c13e25630a85ba88f9b6a0a7cc0a903caf99477182e513de871957d2f5e490ba9dc291f4f5d396e161152ad5576e18b32cf8054c0db7a6590d1363996703cbe4152fe87ba382797447bb0184943417d7573602c24f9ef1d2d3a943444545c06bcfa7c48dce145d6444db8a933073a6458ae59fb40a021833577de676f1a54185d1c7c2c45e2d38a2066c37cb2e995d384b208412f03cd8a2978bb1ce93487e5e1e4798513d20d5672ccf8602965d6d59d1be826cb1c0b9f844b726e193e0dc12d6075097f49377c8ed0034fbb3273fd03461c8966c570dbd879f7da7dd3d1bd87a0e791a69c1937657fe0d3eb9d48e9c2f9b1d84725357a19313cd5623a74529c2d0040aa0b3601c4ab8a09846c52ef4432b3a1ca7fa5647125b3639f3e750161661bf8ed042354c67a4730ffe4c0e137d58307a039dc88941135eecea4ace461fa7bd45ef75837d64c375f55106159de87f6418dbd39ed1a3582070b0f80524a1a984c59fe60ca930bf70db53061697b8f23d07d5b91086311bdfd17f56b893ebd7f0445605704fd40343dc9607b5fe0f4707987c5fa5194e36697f72640a9eed4c29e4bc68934b43cd6cd6e64d98fe6eee341bd3ce1afe69f166c9a6318edf43a26f30fdfb24cc2cf41e43e24cd2b340a3c40a7e5805b7fecb811cb4835d0983c8da8c48046873c9fa40f43a971e424add54cd7321bd303fe5b5b335d51cea56909587d4906d6828e8dc2dd39de689f59e4a59bf3388f2a4230021c0c27f431b800150ac2f6915334889acc7b0dfc931745b3cb561e66fca9b27ca554c7b24ddaae1119ffa3f01b444cbcc00716c00457a8bb1e54052579c76d28d47af3cd7db0de36e9e955b97874300ec7a4034b4bee91b06aab3c494c3889266bfe4c0b45949e632db6b9a729c5bf03740970ae48bf024fdfbfc5e7e62389daae061eccb2df8c2aa1af5d4ecd450bafeb3893b61d4ef0e7882ae3a66f48612b21ba6b968a6327c032f30335fd9f385973c4d7718c4e3567a33152f7c49136b10e924d1a47a03682337b7fb0c243696afb512bba82a08dacac821a6fffe7bc8d43cb9f63c8ae32e91ee4888e9ffc6e74c11a22eeea9d9fc47478d89b21f4fca6f0eafb0bc9045353eed36fc75f2d91fb349ff93b4a4e4176ea8b9edf0b4b1f067e9e3895ad7aa8fc4fe49d73e6ed8dae19ee3e8aabffb2e5364f69bd315819bee73469a2ed04a842c65465c9c0f3c0f185276a37f02162a8a68f4dc6ef3be7cf3d3ca564b167d77eb49e0ff2c38369890b2cef73d0c8ac4e9d0a3f5dc86fb47db820ede298b493613727f79c241d82eeeb1f5ffd44a91119d7eb8c77745f5c06af7b9aedd0a58b4ae5e8f576b26656165b8323e725ae33a51bc40b7647ab9c504edf5e063f0b527ac7fa46403808cef01189f22e1eb819be483ddd049428db50914c0b0a8f553ed97335b6de9cc6b51ae21d5b8642bbefe01600946f2db668f8e7d9f8272901809f9426b59b5a73e92adbbe162f0605450b396f3eefb4074f5d436a609167d7f705f72102cb7ebf4a62bfe0825d4372b7802e5bb791624248b0fb6bbce3f3b558203e4d25fc4bbf1af6e8c5acf8fcc1aa44460ed3801c00f5ecfdbd2b9bfff0466d6bad20910b67d6a43a4b39487bf71ba2d4c3050cac86001eedc2df2d5e8ed9c63e30fa4a92151c7484cee0f23a417fb1b53c5d616391465769eedcddae22e00af33d9504fba45e13baa2b6e6cc6265f5f6123241af4b8cb214978e697bc401615bd57b253c06bf0059cf7da6c5314b223a9de22c73c1d37cf63046a4fd9ae2cb5da57c9a59afc8c69924f21859804cb6f456ec26270de1d6c55db3d5e96a7c12d32946820e561fdccdbf5b74655e6923d0f71e8a3c8124f7bd18c85dcf4c878886a91ff1231d724abe6f24f341f574a3981190f2b32b3c8e3e4f545b0b866bd664a6ea479dc0b709cb2e4a97718389cca906e857f138660be1e3c165fd50259917a5c632bdbdfc3a7cf6e875ea316730f90a7c3bec2a7e454272e0e6b324f35b976236ebfa2a241a0d2c5d7b2d11741015a7fe2ba2bbc403b8ee71de06e28436061b061e653482db8ec416dd0f10cb869a40f47430d3739b505017684ea3e11a93f614f5d518c487df041b6f222802ae7b8b333394f084672147b2165b58a2725a222a1649f6a0ce9c562d9b4e1ea4caa6da2cf0f9a5a678322412c2cde4cb22aff9cdae8c7d244d59f934e9742d1f87e6de9f8e3d9aa66eac1bc58a8fb7d9312e173756830b814671af46e715e8facfb653bdb41a0e7e0386b979b44870cef7e94ef03dc968461eab89c59706eb6681e6f916080df6c9aee3b34573a902232df35ea232dbda6331b9f802c76b425b5f0856957a4a0d1b3fa4dd98504de1376e51fbd5faeb368d2e35c4c034697aa511b74f03992e32db2f75ca0041308541a26d4b9439eabdb2acc955e76eafb126ca34e9ab221f5b118088ba6016cd457e3723bad20fec1777ade689a8836f5a56c5dd9902b18bd527a25abe3179fe0bfe40df75d5d558b16509361239fc57db0a67bea7939da7905e0abd7923dbbe2e19a7f84bef18a557b9512af91aef3523dac144d23b7cea192f48e4e852b0ad858e6b6d5203db94ec9b002e29c28ac", 0xe42}], 0x3}, 0x0) 22:44:37 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf4&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xeb\x11v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x16, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) 22:44:37 executing program 3: perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 684.131667][ T36] audit: type=1326 audit(1622501077.879:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18603 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:37 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) write$cgroup_freezer_state(r0, &(0x7f0000000080)='FROZEN\x00', 0x7) 22:44:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup/syz0\x00', 0x200002, 0x0) 22:44:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000080)=""/187, 0x2a, 0xbb, 0x1}, 0x20) 22:44:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x0, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:38 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='\x00'}, 0x10) [ 684.951486][ T36] audit: type=1326 audit(1622501078.700:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18603 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xd) 22:44:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x40000000}, {0x2}, {0x6}]}) 22:44:38 executing program 2: socketpair(0x28, 0x0, 0x0, &(0x7f0000001580)) 22:44:39 executing program 4: socketpair(0x2, 0x6, 0x0, &(0x7f0000000000)) 22:44:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 685.705034][ T36] audit: type=1326 audit(1622501079.450:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18631 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:39 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg(r0, &(0x7f00000006c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000005c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000680)=""/21, 0x15}, 0x40002040) 22:44:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x1c, 0xa, &(0x7f00000005c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x5, 0xa7, &(0x7f0000000400)=""/167, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:44:39 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4f03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:44:40 executing program 3: perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:44:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x0, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 686.540491][ T36] audit: type=1326 audit(1622501080.290:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18631 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:40 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001380)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0x2, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:44:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x1e, 0xa, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:44:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x48000000}, {0x2}, {0x6}]}) 22:44:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x200}, 0x40) 22:44:40 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0xa, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000d87600008510000007"], &(0x7f0000000140)='syzkaller\x00', 0x5, 0xa7, &(0x7f0000000400)=""/167, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:44:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x7, 0x1, 0xb31, 0x1}, 0x40) 22:44:41 executing program 2: perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 687.221535][ T36] audit: type=1326 audit(1622501080.970:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18659 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:41 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:44:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffce553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) getpid() perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000480)="2e00000014008502000000000000002e230200e22c", 0x15}], 0x1, 0x0, 0x0, 0xa00}, 0x0) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) 22:44:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f00000000c0)="2e00000052008102e00f80ecdb4cb9020a00000401a10001810040fb03001800040fda1b40d819a906000500000f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 22:44:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaa9daaaadd6000000000082b00fe8000000000000090e547f57527a65e5400000000210000aafe80000000000000eb000000000000aa870027a621a59c20da692aff7b762180cc660500db5a0068d33e3b7ff8df33be4fed859b7672ca8537c3f9ef51d2cbb505e259e651fe9e84246feb582fa0ab3401005d50ae95235a79157b2bee14c0a0ff8990538db3b6c922bc3206813d005e161fddd042c6ba39cef70a49df1245887c4b0989321fecbc90a47b5cec5870c2209a6d64cf2a16a828139ab856f6194ca1ea0a9723371109ad201f269d00477dc89dc9f0bfa2b8124797f2170ff1bd588bf9325b4c09b4fadb3405778790cd186581177fe49d982394a8596028b6a0bd42178a087a9e610409b6a11bd8bf9a2d2fb4e7c61354207b2b34a996e399e8bdbeda263abaa7542c83e4abe76edc7bf371043d9a727aba4c3c0b2bbe1827b113d9d2fff8d76b22a5710d000000080000000000000000000006054eefaec9dd9244a0fe0dec2c78d7d048de709c19221fdf1fd6e8e7c25cf83479dc608bdb97ef727fbc4b4985f0a7fdc51dd9fec710708148c95c05a8451e540b51e794fba431deff34c1d00100e46d3b478a362401c9cbc8b546f232f232eee875beea6649504f0e6063f0556ad7a3e795dfc527c34ea70d4083e272c514ad711fd8efd825a329817db760d1f0cd9dcc6f582ee81f5426130acad5f15a8cdac8d7c5027b807f61b32a1f1889459b5cf7c3e1cd3a85cd0271d654b49d319e737003d4dac467ed9815f732aab2bebdf576fbfcc30b6c6e65d2abd363cb2716757dbbee6212c21f91a218dc2908659224d7816fdfaaa02f48ac0b70ded13156f447fe2f50ec2f56ad72f276dbe7527afb9d43ee200000000000ea3b2cd5a7e43f144eb8eccb3d95e72269cd4d42233e9a3c7f8f596aae7fd3bd4f1cb00bee1d320793bc474c8c64aacd5cb3224b0eb1f7e0c25b9e96fb352ce0770bde6c1ec2fd5a74be8d4706d340f33340c9b09affe38a690c0a2546cab3d49ccea80b4aacc946376f3953103ac63b0b29e9502edc19ba97cedee03ed6657f72ccdc73814a016408d47aec21f0b68e2eda1a15518181271cfb4a86feb43e3679c5f4b35759f1583871b90eaf2e9940"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x0, 0x1f, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) 22:44:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x400000, 0x8000000000000002}, 0x40) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001940)={&(0x7f0000001900)='mm_page_alloc\x00', r0}, 0x10) 22:44:41 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map, 0xffffffffffffffff, 0x11}, 0x10) [ 688.075935][ T36] audit: type=1326 audit(1622501081.820:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18659 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 22:44:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x4c000000}, {0x2}, {0x6}]}) [ 688.280197][T18676] device syzkaller1 entered promiscuous mode 22:44:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f00000000c0)="2e00000052008102e00f80ecdb4cb9020a00000401a10001810040fb03001800040fda1b40d819a906000500000f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 22:44:42 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000840)=""/221, 0xdd}], 0x1}, 0x0) [ 688.846774][ T36] audit: type=1326 audit(1622501082.600:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18691 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f9c549 code=0x0 [ 688.909737][T18686] ===================================================== [ 688.913829][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 688.913829][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Not tainted 5.12.0-rc6-syzkaller #0 [ 688.913829][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.913829][T18686] Call Trace: [ 688.913829][T18686] dump_stack+0x24c/0x2e0 [ 688.913829][T18686] kmsan_report+0xfb/0x1e0 [ 688.913829][T18686] __msan_warning+0x5c/0xa0 [ 688.913829][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 688.964480][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 688.964480][T18686] __vmalloc_node_range+0xc83/0x1310 [ 688.974834][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 688.974834][T18686] __bpf_map_area_alloc+0x344/0x380 [ 688.974834][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 688.974834][T18686] bpf_map_area_alloc+0x6c/0x80 [ 688.994127][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 688.994127][T18686] array_map_alloc+0x53d/0xc70 [ 688.994127][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 688.994127][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 688.994127][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 688.994127][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 688.994127][T18686] ? kmsan_get_metadata+0x116/0x180 [ 688.994127][T18686] ? kmsan_get_metadata+0x116/0x180 [ 688.994127][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 688.994127][T18686] ? kmsan_get_metadata+0x116/0x180 [ 688.994127][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 688.994127][T18686] ? kmsan_get_metadata+0x116/0x180 [ 688.994127][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 688.994127][T18686] ? kmsan_get_metadata+0x116/0x180 [ 688.994127][T18686] ? kmsan_get_metadata+0x116/0x180 [ 688.994127][T18686] __se_sys_bpf+0x8e/0xa0 [ 688.994127][T18686] __ia32_sys_bpf+0x4a/0x70 [ 688.994127][T18686] __do_fast_syscall_32+0x127/0x180 [ 688.994127][T18686] do_fast_syscall_32+0x77/0xd0 [ 688.994127][T18686] do_SYSENTER_32+0x73/0x90 [ 688.994127][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 688.994127][T18686] RIP: 0023:0xf7fb4549 [ 688.994127][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 688.994127][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 688.994127][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 688.994127][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 688.994127][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 688.994127][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 688.994127][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 688.994127][T18686] [ 688.994127][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 688.994127][T18686] __bpf_prog_run32+0x84/0x190 [ 688.994127][T18686] __bpf_prog_run32+0x84/0x190 [ 688.994127][T18686] ===================================================== [ 688.994127][T18686] Disabling lock debugging due to kernel taint [ 689.218484][T18686] ===================================================== [ 689.225433][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 689.229604][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 689.229604][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.229604][T18686] Call Trace: [ 689.229604][T18686] dump_stack+0x24c/0x2e0 [ 689.229604][T18686] kmsan_report+0xfb/0x1e0 [ 689.264163][T18686] __msan_warning+0x5c/0xa0 [ 689.267483][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 689.267483][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 689.267483][T18686] __vmalloc_node_range+0xc83/0x1310 [ 689.267483][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 689.267483][T18686] __bpf_map_area_alloc+0x344/0x380 [ 689.294603][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 689.294603][T18686] bpf_map_area_alloc+0x6c/0x80 [ 689.294603][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 689.294603][T18686] array_map_alloc+0x53d/0xc70 [ 689.294603][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 689.294603][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 689.294603][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 689.294603][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 689.294603][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.294603][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.294603][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 689.294603][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.294603][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 689.294603][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.294603][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 689.294603][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.294603][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.294603][T18686] __se_sys_bpf+0x8e/0xa0 [ 689.294603][T18686] __ia32_sys_bpf+0x4a/0x70 [ 689.294603][T18686] __do_fast_syscall_32+0x127/0x180 [ 689.294603][T18686] do_fast_syscall_32+0x77/0xd0 [ 689.294603][T18686] do_SYSENTER_32+0x73/0x90 [ 689.294603][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 689.294603][T18686] RIP: 0023:0xf7fb4549 [ 689.294603][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 689.294603][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 689.294603][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 689.294603][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 689.294603][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 689.294603][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 689.294603][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 689.294603][T18686] [ 689.294603][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 689.294603][T18686] __bpf_prog_run32+0x84/0x190 [ 689.294603][T18686] __bpf_prog_run32+0x84/0x190 [ 689.294603][T18686] ===================================================== [ 689.518024][T18686] ===================================================== [ 689.525095][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 689.527620][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 689.527620][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.544045][T18686] Call Trace: [ 689.544045][T18686] dump_stack+0x24c/0x2e0 [ 689.544045][T18686] kmsan_report+0xfb/0x1e0 [ 689.544045][T18686] __msan_warning+0x5c/0xa0 [ 689.544045][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 689.573947][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 689.573947][T18686] __vmalloc_node_range+0xc83/0x1310 [ 689.573947][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 689.573947][T18686] __bpf_map_area_alloc+0x344/0x380 [ 689.573947][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 689.573947][T18686] bpf_map_area_alloc+0x6c/0x80 [ 689.573947][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 689.573947][T18686] array_map_alloc+0x53d/0xc70 [ 689.573947][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 689.573947][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 689.573947][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 689.573947][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 689.573947][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.573947][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.573947][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 689.573947][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.573947][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 689.573947][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.573947][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 689.573947][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.573947][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.573947][T18686] __se_sys_bpf+0x8e/0xa0 [ 689.573947][T18686] __ia32_sys_bpf+0x4a/0x70 [ 689.573947][T18686] __do_fast_syscall_32+0x127/0x180 [ 689.573947][T18686] do_fast_syscall_32+0x77/0xd0 [ 689.573947][T18686] do_SYSENTER_32+0x73/0x90 [ 689.573947][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 689.573947][T18686] RIP: 0023:0xf7fb4549 [ 689.573947][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 689.573947][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 689.573947][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 689.573947][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 689.573947][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 689.573947][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 689.573947][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 689.573947][T18686] [ 689.573947][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 689.573947][T18686] __bpf_prog_run32+0x84/0x190 [ 689.573947][T18686] __bpf_prog_run32+0x84/0x190 [ 689.573947][T18686] ===================================================== [ 689.817427][T18686] ===================================================== [ 689.824416][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 689.827304][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 689.835015][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.843923][T18686] Call Trace: [ 689.843923][T18686] dump_stack+0x24c/0x2e0 [ 689.843923][T18686] kmsan_report+0xfb/0x1e0 [ 689.843923][T18686] __msan_warning+0x5c/0xa0 [ 689.843923][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 689.873949][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 689.873949][T18686] __vmalloc_node_range+0xc83/0x1310 [ 689.873949][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 689.873949][T18686] __bpf_map_area_alloc+0x344/0x380 [ 689.873949][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 689.873949][T18686] bpf_map_area_alloc+0x6c/0x80 [ 689.873949][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 689.873949][T18686] array_map_alloc+0x53d/0xc70 [ 689.873949][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 689.873949][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 689.873949][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 689.873949][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 689.873949][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.873949][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.873949][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 689.873949][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.873949][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 689.873949][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.873949][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 689.873949][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.873949][T18686] ? kmsan_get_metadata+0x116/0x180 [ 689.873949][T18686] __se_sys_bpf+0x8e/0xa0 [ 689.873949][T18686] __ia32_sys_bpf+0x4a/0x70 [ 689.873949][T18686] __do_fast_syscall_32+0x127/0x180 [ 689.873949][T18686] do_fast_syscall_32+0x77/0xd0 [ 689.873949][T18686] do_SYSENTER_32+0x73/0x90 [ 689.873949][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 689.873949][T18686] RIP: 0023:0xf7fb4549 [ 689.873949][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 689.873949][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 689.873949][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 689.873949][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 689.873949][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 689.873949][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 689.873949][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 689.873949][T18686] [ 689.873949][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 689.873949][T18686] __bpf_prog_run32+0x84/0x190 [ 689.873949][T18686] __bpf_prog_run32+0x84/0x190 [ 689.873949][T18686] ===================================================== [ 690.116178][T18686] ===================================================== [ 690.123302][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 690.126089][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 690.126089][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.126089][T18686] Call Trace: [ 690.126089][T18686] dump_stack+0x24c/0x2e0 [ 690.126089][T18686] kmsan_report+0xfb/0x1e0 [ 690.126089][T18686] __msan_warning+0x5c/0xa0 [ 690.126089][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 690.126089][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 690.126089][T18686] __vmalloc_node_range+0xc83/0x1310 [ 690.126089][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 690.126089][T18686] __bpf_map_area_alloc+0x344/0x380 [ 690.126089][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 690.126089][T18686] bpf_map_area_alloc+0x6c/0x80 [ 690.126089][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 690.126089][T18686] array_map_alloc+0x53d/0xc70 [ 690.126089][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 690.126089][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 690.126089][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 690.126089][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 690.126089][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.126089][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.126089][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 690.126089][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.126089][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 690.126089][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.126089][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 690.126089][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.126089][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.126089][T18686] __se_sys_bpf+0x8e/0xa0 [ 690.126089][T18686] __ia32_sys_bpf+0x4a/0x70 [ 690.126089][T18686] __do_fast_syscall_32+0x127/0x180 [ 690.126089][T18686] do_fast_syscall_32+0x77/0xd0 [ 690.126089][T18686] do_SYSENTER_32+0x73/0x90 [ 690.126089][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 690.126089][T18686] RIP: 0023:0xf7fb4549 [ 690.126089][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 690.126089][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 690.126089][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 690.126089][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 690.126089][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 690.126089][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 690.126089][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 690.126089][T18686] [ 690.126089][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 690.126089][T18686] __bpf_prog_run32+0x84/0x190 [ 690.126089][T18686] __bpf_prog_run32+0x84/0x190 [ 690.126089][T18686] ===================================================== [ 690.415214][T18686] ===================================================== [ 690.422149][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 690.425150][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 690.425150][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.443924][T18686] Call Trace: [ 690.443924][T18686] dump_stack+0x24c/0x2e0 [ 690.443924][T18686] kmsan_report+0xfb/0x1e0 [ 690.443924][T18686] __msan_warning+0x5c/0xa0 [ 690.443924][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 690.443924][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 690.473990][T18686] __vmalloc_node_range+0xc83/0x1310 [ 690.473990][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 690.473990][T18686] __bpf_map_area_alloc+0x344/0x380 [ 690.473990][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 690.473990][T18686] bpf_map_area_alloc+0x6c/0x80 [ 690.503929][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 690.503929][T18686] array_map_alloc+0x53d/0xc70 [ 690.503929][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 690.503929][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 690.503929][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 690.503929][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 690.534088][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.534088][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.534088][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 690.534088][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.534088][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 690.565037][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.565037][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 690.565037][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.565037][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.565037][T18686] __se_sys_bpf+0x8e/0xa0 [ 690.565037][T18686] __ia32_sys_bpf+0x4a/0x70 [ 690.594018][T18686] __do_fast_syscall_32+0x127/0x180 [ 690.594018][T18686] do_fast_syscall_32+0x77/0xd0 [ 690.594018][T18686] do_SYSENTER_32+0x73/0x90 [ 690.594018][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 690.594018][T18686] RIP: 0023:0xf7fb4549 [ 690.594018][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 690.624093][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 690.624093][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 690.654347][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 690.654347][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 690.654347][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 690.654347][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 690.683983][T18686] [ 690.683983][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 690.683983][T18686] __bpf_prog_run32+0x84/0x190 [ 690.683983][T18686] __bpf_prog_run32+0x84/0x190 [ 690.683983][T18686] ===================================================== [ 690.715625][T18686] ===================================================== [ 690.722566][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 690.725577][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 690.725577][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.744125][T18686] Call Trace: [ 690.744125][T18686] dump_stack+0x24c/0x2e0 [ 690.744125][T18686] kmsan_report+0xfb/0x1e0 [ 690.744125][T18686] __msan_warning+0x5c/0xa0 [ 690.744125][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 690.744125][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 690.774231][T18686] __vmalloc_node_range+0xc83/0x1310 [ 690.774231][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 690.774231][T18686] __bpf_map_area_alloc+0x344/0x380 [ 690.774231][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 690.774231][T18686] bpf_map_area_alloc+0x6c/0x80 [ 690.804067][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 690.804067][T18686] array_map_alloc+0x53d/0xc70 [ 690.804067][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 690.804067][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 690.804067][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 690.804067][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 690.834150][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.834150][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.834150][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 690.834150][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.834150][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 690.863995][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.863995][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 690.863995][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.863995][T18686] ? kmsan_get_metadata+0x116/0x180 [ 690.863995][T18686] __se_sys_bpf+0x8e/0xa0 [ 690.863995][T18686] __ia32_sys_bpf+0x4a/0x70 [ 690.895168][T18686] __do_fast_syscall_32+0x127/0x180 [ 690.895168][T18686] do_fast_syscall_32+0x77/0xd0 [ 690.895168][T18686] do_SYSENTER_32+0x73/0x90 [ 690.895168][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c 22:44:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x403, {0x0, {0x0, 0x1000, 0x6}, 0xc3, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa9e, 0x0, 0x0, 0x7fffffff, 0x0, 0x42c8, 0x85, 0x0, 0x1}}, 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x2, 0x0, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) getdents64(r4, &(0x7f0000000280)=""/35, 0x23) getdents(0xffffffffffffffff, &(0x7f0000000300)=""/210, 0xd2) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x3f, 0x62, 0x41, 0x0, 0x0, 0x200000000008, 0x1cf15, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, 0x0, 0xa38, 0xfffffffffffffffe, 0x800a8, 0x7, 0x1, 0x9, 0x8}, r2, 0x10, r4, 0xc) [ 690.895168][T18686] RIP: 0023:0xf7fb4549 [ 690.895168][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 690.924331][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 690.924331][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 690.954140][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 690.954140][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 690.954140][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 690.954140][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 690.983985][T18686] [ 690.983985][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 690.983985][T18686] __bpf_prog_run32+0x84/0x190 [ 690.983985][T18686] __bpf_prog_run32+0x84/0x190 [ 690.983985][T18686] ===================================================== [ 691.015905][T18686] ===================================================== [ 691.022851][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 691.025856][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 691.025856][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.044006][T18686] Call Trace: [ 691.044006][T18686] dump_stack+0x24c/0x2e0 [ 691.044006][T18686] kmsan_report+0xfb/0x1e0 [ 691.044006][T18686] __msan_warning+0x5c/0xa0 [ 691.044006][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 691.044006][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 691.044006][T18686] __vmalloc_node_range+0xc83/0x1310 [ 691.044006][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 691.044006][T18686] __bpf_map_area_alloc+0x344/0x380 [ 691.044006][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 691.044006][T18686] bpf_map_area_alloc+0x6c/0x80 [ 691.044006][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 691.044006][T18686] array_map_alloc+0x53d/0xc70 [ 691.044006][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 691.044006][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 691.044006][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 691.044006][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 691.044006][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.044006][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.044006][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 691.044006][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.044006][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 691.044006][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.044006][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 691.044006][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.044006][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.044006][T18686] __se_sys_bpf+0x8e/0xa0 [ 691.044006][T18686] __ia32_sys_bpf+0x4a/0x70 [ 691.044006][T18686] __do_fast_syscall_32+0x127/0x180 [ 691.044006][T18686] do_fast_syscall_32+0x77/0xd0 [ 691.044006][T18686] do_SYSENTER_32+0x73/0x90 [ 691.044006][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 691.044006][T18686] RIP: 0023:0xf7fb4549 [ 691.044006][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 691.044006][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 691.044006][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 691.044006][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 691.044006][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 691.044006][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 691.044006][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 691.044006][T18686] [ 691.044006][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 691.044006][T18686] __bpf_prog_run32+0x84/0x190 [ 691.044006][T18686] __bpf_prog_run32+0x84/0x190 [ 691.044006][T18686] ===================================================== [ 691.315667][T18686] ===================================================== [ 691.322600][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 691.325622][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 691.325622][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.344150][T18686] Call Trace: [ 691.344150][T18686] dump_stack+0x24c/0x2e0 [ 691.344150][T18686] kmsan_report+0xfb/0x1e0 [ 691.344150][T18686] __msan_warning+0x5c/0xa0 [ 691.363944][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 691.363944][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 691.374420][T18686] __vmalloc_node_range+0xc83/0x1310 [ 691.374420][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 691.374420][T18686] __bpf_map_area_alloc+0x344/0x380 [ 691.374420][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 691.374420][T18686] bpf_map_area_alloc+0x6c/0x80 [ 691.404020][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 691.404020][T18686] array_map_alloc+0x53d/0xc70 [ 691.404020][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 691.404020][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 691.404020][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 691.404020][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 691.434391][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.434391][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.434391][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 691.434391][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.434391][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 691.464048][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.464048][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 691.464048][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.464048][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.464048][T18686] __se_sys_bpf+0x8e/0xa0 [ 691.464048][T18686] __ia32_sys_bpf+0x4a/0x70 [ 691.494179][T18686] __do_fast_syscall_32+0x127/0x180 [ 691.494179][T18686] do_fast_syscall_32+0x77/0xd0 [ 691.494179][T18686] do_SYSENTER_32+0x73/0x90 [ 691.494179][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 691.494179][T18686] RIP: 0023:0xf7fb4549 [ 691.494179][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 691.525194][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 691.525194][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 691.554061][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 691.554061][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 691.554061][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 691.554061][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 691.584183][T18686] [ 691.584183][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 691.584183][T18686] __bpf_prog_run32+0x84/0x190 [ 691.584183][T18686] __bpf_prog_run32+0x84/0x190 [ 691.584183][T18686] ===================================================== [ 691.615892][T18686] ===================================================== [ 691.622861][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 691.625845][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 691.625845][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.643987][T18686] Call Trace: [ 691.643987][T18686] dump_stack+0x24c/0x2e0 [ 691.643987][T18686] kmsan_report+0xfb/0x1e0 [ 691.643987][T18686] __msan_warning+0x5c/0xa0 [ 691.643987][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 691.643987][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 691.674085][T18686] __vmalloc_node_range+0xc83/0x1310 [ 691.674085][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 691.674085][T18686] __bpf_map_area_alloc+0x344/0x380 [ 691.674085][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 691.674085][T18686] bpf_map_area_alloc+0x6c/0x80 [ 691.704129][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 691.704129][T18686] array_map_alloc+0x53d/0xc70 [ 691.704129][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 691.718331][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 691.718331][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 691.718331][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 691.734063][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.734063][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.734063][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 691.734063][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.734063][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 691.763934][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.763934][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 691.763934][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.763934][T18686] ? kmsan_get_metadata+0x116/0x180 [ 691.763934][T18686] __se_sys_bpf+0x8e/0xa0 [ 691.763934][T18686] __ia32_sys_bpf+0x4a/0x70 [ 691.794043][T18686] __do_fast_syscall_32+0x127/0x180 [ 691.794043][T18686] do_fast_syscall_32+0x77/0xd0 [ 691.794043][T18686] do_SYSENTER_32+0x73/0x90 [ 691.794043][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 691.794043][T18686] RIP: 0023:0xf7fb4549 [ 691.794043][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 691.823998][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 691.823998][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 691.854918][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 691.854918][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 691.854918][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 691.854918][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 691.884098][T18686] [ 691.884098][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 691.884098][T18686] __bpf_prog_run32+0x84/0x190 [ 691.884098][T18686] __bpf_prog_run32+0x84/0x190 [ 691.884098][T18686] ===================================================== [ 691.916961][T18686] ===================================================== [ 691.923904][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 691.926909][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 691.926909][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.944171][T18686] Call Trace: [ 691.944171][T18686] dump_stack+0x24c/0x2e0 [ 691.944171][T18686] kmsan_report+0xfb/0x1e0 [ 691.944171][T18686] __msan_warning+0x5c/0xa0 [ 691.944171][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 691.974122][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 691.974122][T18686] __vmalloc_node_range+0xc83/0x1310 [ 691.974122][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 691.974122][T18686] __bpf_map_area_alloc+0x344/0x380 [ 691.974122][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 691.974122][T18686] bpf_map_area_alloc+0x6c/0x80 [ 692.004010][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.004010][T18686] array_map_alloc+0x53d/0xc70 [ 692.004010][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 692.004010][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 692.004010][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 692.034073][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 692.034073][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.034073][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.034073][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.034073][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.034073][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 692.064022][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.064022][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.064022][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.064022][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.064022][T18686] __se_sys_bpf+0x8e/0xa0 [ 692.094056][T18686] __ia32_sys_bpf+0x4a/0x70 [ 692.094056][T18686] __do_fast_syscall_32+0x127/0x180 [ 692.094056][T18686] do_fast_syscall_32+0x77/0xd0 [ 692.094056][T18686] do_SYSENTER_32+0x73/0x90 [ 692.094056][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 692.094056][T18686] RIP: 0023:0xf7fb4549 [ 692.123980][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 692.123980][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 692.123980][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 692.154072][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 692.154072][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 692.174717][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 692.184058][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 692.184058][T18686] [ 692.184058][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 692.184058][T18686] __bpf_prog_run32+0x84/0x190 [ 692.184058][T18686] __bpf_prog_run32+0x84/0x190 [ 692.184058][T18686] ===================================================== [ 692.219193][T18686] ===================================================== [ 692.226146][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 692.229142][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 692.244111][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.244111][T18686] Call Trace: [ 692.244111][T18686] dump_stack+0x24c/0x2e0 [ 692.244111][T18686] kmsan_report+0xfb/0x1e0 [ 692.244111][T18686] __msan_warning+0x5c/0xa0 [ 692.244111][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 692.274007][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 692.274007][T18686] __vmalloc_node_range+0xc83/0x1310 [ 692.286006][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 692.286006][T18686] __bpf_map_area_alloc+0x344/0x380 [ 692.286006][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 692.304000][T18686] bpf_map_area_alloc+0x6c/0x80 [ 692.304000][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.304000][T18686] array_map_alloc+0x53d/0xc70 [ 692.304000][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 692.304000][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 692.304000][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 692.334084][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 692.334084][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.334084][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.334084][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.334084][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.334084][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 692.364092][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.364092][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.364092][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.364092][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.364092][T18686] __se_sys_bpf+0x8e/0xa0 [ 692.394113][T18686] __ia32_sys_bpf+0x4a/0x70 [ 692.394113][T18686] __do_fast_syscall_32+0x127/0x180 [ 692.394113][T18686] do_fast_syscall_32+0x77/0xd0 [ 692.394113][T18686] do_SYSENTER_32+0x73/0x90 [ 692.394113][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 692.394113][T18686] RIP: 0023:0xf7fb4549 [ 692.423944][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 692.423944][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 692.423944][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 692.454126][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 692.454126][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 692.454126][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 692.454126][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 692.454126][T18686] [ 692.454126][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 692.454126][T18686] __bpf_prog_run32+0x84/0x190 [ 692.454126][T18686] __bpf_prog_run32+0x84/0x190 [ 692.454126][T18686] ===================================================== [ 692.519042][T18686] ===================================================== [ 692.525982][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 692.530670][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 692.530670][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.553950][T18686] Call Trace: [ 692.553950][T18686] dump_stack+0x24c/0x2e0 [ 692.553950][T18686] kmsan_report+0xfb/0x1e0 [ 692.553950][T18686] __msan_warning+0x5c/0xa0 [ 692.553950][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 692.553950][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 692.553950][T18686] __vmalloc_node_range+0xc83/0x1310 [ 692.584077][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 692.584077][T18686] __bpf_map_area_alloc+0x344/0x380 [ 692.584077][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 692.584077][T18686] bpf_map_area_alloc+0x6c/0x80 [ 692.584077][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.613994][T18686] array_map_alloc+0x53d/0xc70 [ 692.613994][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 692.613994][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 692.613994][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 692.613994][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 692.613994][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.644105][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.644105][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.644105][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.644105][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 692.644105][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.673935][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.673935][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.673935][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.673935][T18686] __se_sys_bpf+0x8e/0xa0 [ 692.673935][T18686] __ia32_sys_bpf+0x4a/0x70 [ 692.673935][T18686] __do_fast_syscall_32+0x127/0x180 [ 692.704079][T18686] do_fast_syscall_32+0x77/0xd0 [ 692.704079][T18686] do_SYSENTER_32+0x73/0x90 [ 692.704079][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 692.704079][T18686] RIP: 0023:0xf7fb4549 [ 692.704079][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 692.734081][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 692.734081][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 692.734081][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 692.764055][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 692.764055][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 692.764055][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 692.764055][T18686] [ 692.794059][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 692.794059][T18686] __bpf_prog_run32+0x84/0x190 [ 692.794059][T18686] __bpf_prog_run32+0x84/0x190 [ 692.794059][T18686] ===================================================== [ 692.819210][T18686] ===================================================== [ 692.826139][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 692.829166][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 692.829166][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.853986][T18686] Call Trace: [ 692.853986][T18686] dump_stack+0x24c/0x2e0 [ 692.853986][T18686] kmsan_report+0xfb/0x1e0 [ 692.853986][T18686] __msan_warning+0x5c/0xa0 [ 692.853986][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 692.853986][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 692.853986][T18686] __vmalloc_node_range+0xc83/0x1310 [ 692.884083][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 692.884083][T18686] __bpf_map_area_alloc+0x344/0x380 [ 692.884083][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 692.884083][T18686] bpf_map_area_alloc+0x6c/0x80 [ 692.884083][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.884083][T18686] array_map_alloc+0x53d/0xc70 [ 692.884083][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 692.884083][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 692.884083][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 692.884083][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 692.884083][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.884083][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.884083][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.884083][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.884083][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 692.884083][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.884083][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 692.884083][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.884083][T18686] ? kmsan_get_metadata+0x116/0x180 [ 692.884083][T18686] __se_sys_bpf+0x8e/0xa0 [ 692.884083][T18686] __ia32_sys_bpf+0x4a/0x70 [ 692.884083][T18686] __do_fast_syscall_32+0x127/0x180 [ 692.884083][T18686] do_fast_syscall_32+0x77/0xd0 [ 692.884083][T18686] do_SYSENTER_32+0x73/0x90 [ 692.884083][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 692.884083][T18686] RIP: 0023:0xf7fb4549 [ 692.884083][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 692.884083][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 692.884083][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 692.884083][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 692.884083][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 692.884083][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 692.884083][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 692.884083][T18686] [ 692.884083][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 692.884083][T18686] __bpf_prog_run32+0x84/0x190 [ 692.884083][T18686] __bpf_prog_run32+0x84/0x190 [ 692.884083][T18686] ===================================================== [ 693.119045][T18686] ===================================================== [ 693.126035][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 693.128998][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 693.144015][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.144015][T18686] Call Trace: [ 693.144015][T18686] dump_stack+0x24c/0x2e0 [ 693.144015][T18686] kmsan_report+0xfb/0x1e0 [ 693.144015][T18686] __msan_warning+0x5c/0xa0 [ 693.144015][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 693.174024][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 693.174024][T18686] __vmalloc_node_range+0xc83/0x1310 [ 693.174024][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 693.174024][T18686] __bpf_map_area_alloc+0x344/0x380 [ 693.174024][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 693.174024][T18686] bpf_map_area_alloc+0x6c/0x80 [ 693.203965][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 693.203965][T18686] array_map_alloc+0x53d/0xc70 [ 693.203965][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 693.203965][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 693.203965][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 693.234094][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 693.234094][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.234094][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.234094][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 693.234094][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.234094][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 693.264044][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.264044][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 693.264044][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.264044][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.264044][T18686] __se_sys_bpf+0x8e/0xa0 [ 693.294054][T18686] __ia32_sys_bpf+0x4a/0x70 [ 693.294054][T18686] __do_fast_syscall_32+0x127/0x180 [ 693.294054][T18686] do_fast_syscall_32+0x77/0xd0 [ 693.294054][T18686] do_SYSENTER_32+0x73/0x90 [ 693.294054][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 693.294054][T18686] RIP: 0023:0xf7fb4549 [ 693.323959][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 693.323959][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 693.323959][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 693.353988][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 693.353988][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 693.353988][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 693.353988][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 693.353988][T18686] [ 693.353988][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 693.353988][T18686] __bpf_prog_run32+0x84/0x190 [ 693.353988][T18686] __bpf_prog_run32+0x84/0x190 [ 693.353988][T18686] ===================================================== [ 693.418761][T18686] ===================================================== [ 693.425751][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 693.428716][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 693.428716][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.428716][T18686] Call Trace: [ 693.454332][T18686] dump_stack+0x24c/0x2e0 [ 693.454332][T18686] kmsan_report+0xfb/0x1e0 [ 693.454332][T18686] __msan_warning+0x5c/0xa0 [ 693.454332][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 693.454332][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 693.454332][T18686] __vmalloc_node_range+0xc83/0x1310 [ 693.484100][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 693.484100][T18686] __bpf_map_area_alloc+0x344/0x380 [ 693.484100][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 693.484100][T18686] bpf_map_area_alloc+0x6c/0x80 [ 693.484100][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 693.514081][T18686] array_map_alloc+0x53d/0xc70 [ 693.514081][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 693.514081][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 693.514081][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 693.514081][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 693.514081][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.544071][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.544071][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 693.544071][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.544071][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 693.544071][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.573981][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 693.573981][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.573981][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.573981][T18686] __se_sys_bpf+0x8e/0xa0 [ 693.573981][T18686] __ia32_sys_bpf+0x4a/0x70 [ 693.573981][T18686] __do_fast_syscall_32+0x127/0x180 [ 693.604071][T18686] do_fast_syscall_32+0x77/0xd0 [ 693.604071][T18686] do_SYSENTER_32+0x73/0x90 [ 693.604071][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 693.604071][T18686] RIP: 0023:0xf7fb4549 [ 693.604071][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 693.634034][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 693.634034][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 693.634034][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 693.664017][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 693.664017][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 693.664017][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 693.688962][T18686] [ 693.694457][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 693.694457][T18686] __bpf_prog_run32+0x84/0x190 [ 693.694457][T18686] __bpf_prog_run32+0x84/0x190 [ 693.694457][T18686] ===================================================== [ 693.718963][T18686] ===================================================== [ 693.726198][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 693.728914][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 693.728914][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.754081][T18686] Call Trace: [ 693.754081][T18686] dump_stack+0x24c/0x2e0 [ 693.754081][T18686] kmsan_report+0xfb/0x1e0 [ 693.754081][T18686] __msan_warning+0x5c/0xa0 [ 693.754081][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 693.754081][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 693.754081][T18686] __vmalloc_node_range+0xc83/0x1310 [ 693.784570][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 693.784570][T18686] __bpf_map_area_alloc+0x344/0x380 [ 693.784570][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 693.784570][T18686] bpf_map_area_alloc+0x6c/0x80 [ 693.784570][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 693.814031][T18686] array_map_alloc+0x53d/0xc70 [ 693.814031][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 693.814031][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 693.814031][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 693.814031][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 693.814031][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.843990][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.843990][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 693.843990][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.843990][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 693.843990][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.874101][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 693.874101][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.874101][T18686] ? kmsan_get_metadata+0x116/0x180 [ 693.874101][T18686] __se_sys_bpf+0x8e/0xa0 [ 693.874101][T18686] __ia32_sys_bpf+0x4a/0x70 [ 693.874101][T18686] __do_fast_syscall_32+0x127/0x180 [ 693.904029][T18686] do_fast_syscall_32+0x77/0xd0 [ 693.904029][T18686] do_SYSENTER_32+0x73/0x90 [ 693.904029][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 693.904029][T18686] RIP: 0023:0xf7fb4549 [ 693.904029][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 693.934561][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 693.934561][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 693.934561][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 693.964086][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 693.964086][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 693.964086][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 693.964086][T18686] [ 693.994081][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 693.994081][T18686] __bpf_prog_run32+0x84/0x190 [ 693.994081][T18686] __bpf_prog_run32+0x84/0x190 [ 693.994081][T18686] ===================================================== [ 694.019620][T18686] ===================================================== [ 694.026553][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 694.029566][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 694.029566][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.054064][T18686] Call Trace: [ 694.054064][T18686] dump_stack+0x24c/0x2e0 [ 694.054064][T18686] kmsan_report+0xfb/0x1e0 [ 694.054064][T18686] __msan_warning+0x5c/0xa0 [ 694.054064][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 694.054064][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 694.054064][T18686] __vmalloc_node_range+0xc83/0x1310 [ 694.084284][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 694.084284][T18686] __bpf_map_area_alloc+0x344/0x380 [ 694.084284][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 694.084284][T18686] bpf_map_area_alloc+0x6c/0x80 [ 694.084284][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 694.113993][T18686] array_map_alloc+0x53d/0xc70 [ 694.113993][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 694.113993][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 694.113993][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 694.113993][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 694.113993][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.144040][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.144040][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 694.144040][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.144040][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 694.144040][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.144040][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 694.179622][ T3127] ieee802154 phy0 wpan0: encryption failed: -22 [ 694.178869][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.178869][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.188243][ T3127] ieee802154 phy1 wpan1: encryption failed: -22 [ 694.178869][T18686] __se_sys_bpf+0x8e/0xa0 [ 694.178869][T18686] __ia32_sys_bpf+0x4a/0x70 [ 694.203954][T18686] __do_fast_syscall_32+0x127/0x180 [ 694.203954][T18686] do_fast_syscall_32+0x77/0xd0 [ 694.203954][T18686] do_SYSENTER_32+0x73/0x90 [ 694.203954][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 694.233966][T18686] RIP: 0023:0xf7fb4549 [ 694.233966][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 694.233966][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 694.264071][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 694.264071][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 694.264071][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 694.264071][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 694.294060][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 694.294060][T18686] [ 694.294060][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 694.294060][T18686] __bpf_prog_run32+0x84/0x190 [ 694.294060][T18686] __bpf_prog_run32+0x84/0x190 [ 694.324016][T18686] ===================================================== [ 694.333095][T18686] ===================================================== [ 694.340129][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 694.343038][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 694.354047][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.354047][T18686] Call Trace: [ 694.354047][T18686] dump_stack+0x24c/0x2e0 [ 694.354047][T18686] kmsan_report+0xfb/0x1e0 [ 694.354047][T18686] __msan_warning+0x5c/0xa0 [ 694.384001][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 694.384001][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 694.384001][T18686] __vmalloc_node_range+0xc83/0x1310 [ 694.384001][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 694.384001][T18686] __bpf_map_area_alloc+0x344/0x380 [ 694.384001][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 694.414307][T18686] bpf_map_area_alloc+0x6c/0x80 [ 694.414307][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 694.414307][T18686] array_map_alloc+0x53d/0xc70 [ 694.414307][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 694.414307][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 694.444027][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 694.444027][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 694.444027][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.444027][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.444027][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 694.444027][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.473965][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 694.473965][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.473965][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 694.473965][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.473965][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.504176][T18686] __se_sys_bpf+0x8e/0xa0 [ 694.504176][T18686] __ia32_sys_bpf+0x4a/0x70 [ 694.504176][T18686] __do_fast_syscall_32+0x127/0x180 [ 694.504176][T18686] do_fast_syscall_32+0x77/0xd0 [ 694.504176][T18686] do_SYSENTER_32+0x73/0x90 [ 694.504176][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 694.534007][T18686] RIP: 0023:0xf7fb4549 [ 694.534007][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 694.534007][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 694.563958][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 694.563958][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 694.563958][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 694.563958][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 694.563958][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 694.563958][T18686] [ 694.563958][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 694.563958][T18686] __bpf_prog_run32+0x84/0x190 [ 694.563958][T18686] __bpf_prog_run32+0x84/0x190 [ 694.563958][T18686] ===================================================== [ 694.632966][T18686] ===================================================== [ 694.639925][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 694.642918][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 694.654076][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.654076][T18686] Call Trace: [ 694.654076][T18686] dump_stack+0x24c/0x2e0 [ 694.654076][T18686] kmsan_report+0xfb/0x1e0 [ 694.654076][T18686] __msan_warning+0x5c/0xa0 [ 694.684098][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 694.684098][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 694.684098][T18686] __vmalloc_node_range+0xc83/0x1310 [ 694.684098][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 694.684098][T18686] __bpf_map_area_alloc+0x344/0x380 [ 694.684098][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 694.714019][T18686] bpf_map_area_alloc+0x6c/0x80 [ 694.714019][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 694.714019][T18686] array_map_alloc+0x53d/0xc70 [ 694.714019][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 694.714019][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 694.744088][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 694.744088][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 694.744088][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.744088][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.744088][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 694.744088][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.773988][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 694.773988][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.773988][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 694.773988][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.773988][T18686] ? kmsan_get_metadata+0x116/0x180 [ 694.804060][T18686] __se_sys_bpf+0x8e/0xa0 [ 694.804060][T18686] __ia32_sys_bpf+0x4a/0x70 [ 694.804060][T18686] __do_fast_syscall_32+0x127/0x180 [ 694.804060][T18686] do_fast_syscall_32+0x77/0xd0 [ 694.804060][T18686] do_SYSENTER_32+0x73/0x90 [ 694.804060][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 694.834064][T18686] RIP: 0023:0xf7fb4549 [ 694.834064][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 694.834064][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 694.864084][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 694.864084][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 694.864084][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 694.864084][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 694.894022][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 694.894022][T18686] [ 694.894022][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 694.894022][T18686] __bpf_prog_run32+0x84/0x190 [ 694.894022][T18686] __bpf_prog_run32+0x84/0x190 [ 694.924046][T18686] ===================================================== [ 694.933012][T18686] ===================================================== [ 694.940089][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 694.942959][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 694.954027][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.954027][T18686] Call Trace: [ 694.954027][T18686] dump_stack+0x24c/0x2e0 [ 694.954027][T18686] kmsan_report+0xfb/0x1e0 [ 694.954027][T18686] __msan_warning+0x5c/0xa0 [ 694.984023][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 694.984023][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 694.984023][T18686] __vmalloc_node_range+0xc83/0x1310 [ 694.984023][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 694.984023][T18686] __bpf_map_area_alloc+0x344/0x380 [ 694.984023][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 695.013985][T18686] bpf_map_area_alloc+0x6c/0x80 [ 695.013985][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.013985][T18686] array_map_alloc+0x53d/0xc70 [ 695.013985][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 695.013985][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 695.044089][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 695.044089][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 695.044089][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.044089][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.044089][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.044089][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.074079][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 695.074079][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.074079][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.074079][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.074079][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.103927][T18686] __se_sys_bpf+0x8e/0xa0 [ 695.103927][T18686] __ia32_sys_bpf+0x4a/0x70 [ 695.103927][T18686] __do_fast_syscall_32+0x127/0x180 [ 695.103927][T18686] do_fast_syscall_32+0x77/0xd0 [ 695.103927][T18686] do_SYSENTER_32+0x73/0x90 [ 695.103927][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 695.103927][T18686] RIP: 0023:0xf7fb4549 [ 695.103927][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 695.103927][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 695.103927][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 695.103927][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 695.103927][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 695.103927][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 695.103927][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 695.103927][T18686] [ 695.103927][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 695.103927][T18686] __bpf_prog_run32+0x84/0x190 [ 695.103927][T18686] __bpf_prog_run32+0x84/0x190 [ 695.103927][T18686] ===================================================== [ 695.233388][T18686] ===================================================== [ 695.240409][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 695.243338][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 695.243338][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.264022][T18686] Call Trace: [ 695.264022][T18686] dump_stack+0x24c/0x2e0 [ 695.264022][T18686] kmsan_report+0xfb/0x1e0 [ 695.264022][T18686] __msan_warning+0x5c/0xa0 [ 695.264022][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 695.264022][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 695.293991][T18686] __vmalloc_node_range+0xc83/0x1310 [ 695.293991][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 695.293991][T18686] __bpf_map_area_alloc+0x344/0x380 [ 695.293991][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 695.293991][T18686] bpf_map_area_alloc+0x6c/0x80 [ 695.293991][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.293991][T18686] array_map_alloc+0x53d/0xc70 [ 695.293991][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 695.293991][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 695.293991][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 695.293991][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 695.293991][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.293991][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.293991][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.293991][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.293991][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 695.293991][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.293991][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.293991][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.293991][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.293991][T18686] __se_sys_bpf+0x8e/0xa0 [ 695.293991][T18686] __ia32_sys_bpf+0x4a/0x70 [ 695.293991][T18686] __do_fast_syscall_32+0x127/0x180 [ 695.293991][T18686] do_fast_syscall_32+0x77/0xd0 [ 695.293991][T18686] do_SYSENTER_32+0x73/0x90 [ 695.293991][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 695.293991][T18686] RIP: 0023:0xf7fb4549 [ 695.293991][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 695.293991][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 695.293991][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 695.293991][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 695.293991][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 695.293991][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 695.293991][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 695.293991][T18686] [ 695.293991][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 695.293991][T18686] __bpf_prog_run32+0x84/0x190 [ 695.293991][T18686] __bpf_prog_run32+0x84/0x190 [ 695.293991][T18686] ===================================================== [ 695.533390][T18686] ===================================================== [ 695.540326][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 695.543344][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 695.543344][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.564003][T18686] Call Trace: [ 695.564003][T18686] dump_stack+0x24c/0x2e0 [ 695.564003][T18686] kmsan_report+0xfb/0x1e0 [ 695.564003][T18686] __msan_warning+0x5c/0xa0 [ 695.564003][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 695.564003][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 695.593986][T18686] __vmalloc_node_range+0xc83/0x1310 [ 695.593986][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 695.593986][T18686] __bpf_map_area_alloc+0x344/0x380 [ 695.593986][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 695.593986][T18686] bpf_map_area_alloc+0x6c/0x80 [ 695.593986][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.624031][T18686] array_map_alloc+0x53d/0xc70 [ 695.624031][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 695.624031][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 695.624031][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 695.624031][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 695.654002][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.654002][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.654002][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.654002][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.654002][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 695.654002][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.684102][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.684102][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.684102][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.684102][T18686] __se_sys_bpf+0x8e/0xa0 [ 695.684102][T18686] __ia32_sys_bpf+0x4a/0x70 [ 695.713994][T18686] __do_fast_syscall_32+0x127/0x180 [ 695.713994][T18686] do_fast_syscall_32+0x77/0xd0 [ 695.713994][T18686] do_SYSENTER_32+0x73/0x90 [ 695.713994][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 695.713994][T18686] RIP: 0023:0xf7fb4549 [ 695.713994][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 695.744149][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 695.744149][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 695.774492][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 695.774492][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 695.774492][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 695.774492][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 695.804061][T18686] [ 695.804061][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 695.804061][T18686] __bpf_prog_run32+0x84/0x190 [ 695.804061][T18686] __bpf_prog_run32+0x84/0x190 [ 695.804061][T18686] ===================================================== [ 695.833510][T18686] ===================================================== [ 695.840449][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 695.843454][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 695.843454][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.864892][T18686] Call Trace: [ 695.864892][T18686] dump_stack+0x24c/0x2e0 [ 695.864892][T18686] kmsan_report+0xfb/0x1e0 [ 695.864892][T18686] __msan_warning+0x5c/0xa0 [ 695.864892][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 695.864892][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 695.893979][T18686] __vmalloc_node_range+0xc83/0x1310 [ 695.893979][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 695.893979][T18686] __bpf_map_area_alloc+0x344/0x380 [ 695.893979][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 695.893979][T18686] bpf_map_area_alloc+0x6c/0x80 [ 695.893979][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.924055][T18686] array_map_alloc+0x53d/0xc70 [ 695.924055][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 695.924055][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 695.924055][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 695.924055][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 695.954101][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.954101][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.954101][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.954101][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.954101][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 695.954101][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.983977][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 695.983977][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.983977][T18686] ? kmsan_get_metadata+0x116/0x180 [ 695.983977][T18686] __se_sys_bpf+0x8e/0xa0 [ 695.983977][T18686] __ia32_sys_bpf+0x4a/0x70 [ 695.983977][T18686] __do_fast_syscall_32+0x127/0x180 [ 696.014603][T18686] do_fast_syscall_32+0x77/0xd0 [ 696.014603][T18686] do_SYSENTER_32+0x73/0x90 [ 696.014603][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 696.014603][T18686] RIP: 0023:0xf7fb4549 [ 696.014603][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 696.044105][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 696.044105][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 696.074108][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 696.074108][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 696.074108][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 696.074108][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 696.104098][T18686] [ 696.104098][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 696.104098][T18686] __bpf_prog_run32+0x84/0x190 [ 696.104098][T18686] __bpf_prog_run32+0x84/0x190 [ 696.104098][T18686] ===================================================== [ 696.133936][T18686] ===================================================== [ 696.140880][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 696.143889][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 696.143889][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.163978][T18686] Call Trace: [ 696.163978][T18686] dump_stack+0x24c/0x2e0 [ 696.163978][T18686] kmsan_report+0xfb/0x1e0 [ 696.163978][T18686] __msan_warning+0x5c/0xa0 [ 696.163978][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 696.163978][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 696.193912][T18686] __vmalloc_node_range+0xc83/0x1310 [ 696.193912][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 696.193912][T18686] __bpf_map_area_alloc+0x344/0x380 [ 696.193912][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 696.193912][T18686] bpf_map_area_alloc+0x6c/0x80 [ 696.193912][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 696.223940][T18686] array_map_alloc+0x53d/0xc70 [ 696.223940][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 696.223940][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 696.223940][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 696.223940][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 696.223940][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.223940][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.223940][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 696.223940][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.223940][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 696.223940][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.223940][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 696.223940][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.223940][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.223940][T18686] __se_sys_bpf+0x8e/0xa0 [ 696.223940][T18686] __ia32_sys_bpf+0x4a/0x70 [ 696.223940][T18686] __do_fast_syscall_32+0x127/0x180 [ 696.223940][T18686] do_fast_syscall_32+0x77/0xd0 [ 696.223940][T18686] do_SYSENTER_32+0x73/0x90 [ 696.223940][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 696.223940][T18686] RIP: 0023:0xf7fb4549 [ 696.223940][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 696.223940][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 696.223940][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 696.223940][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 696.223940][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 696.223940][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 696.223940][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 696.223940][T18686] [ 696.223940][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 696.223940][T18686] __bpf_prog_run32+0x84/0x190 [ 696.223940][T18686] __bpf_prog_run32+0x84/0x190 [ 696.223940][T18686] ===================================================== [ 696.434156][T18686] ===================================================== [ 696.441084][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 696.444110][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 696.444110][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.464043][T18686] Call Trace: [ 696.464043][T18686] dump_stack+0x24c/0x2e0 [ 696.474231][T18686] kmsan_report+0xfb/0x1e0 [ 696.474231][T18686] __msan_warning+0x5c/0xa0 [ 696.474231][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 696.474231][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 696.494032][T18686] __vmalloc_node_range+0xc83/0x1310 [ 696.494032][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 696.494032][T18686] __bpf_map_area_alloc+0x344/0x380 [ 696.494032][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 696.494032][T18686] bpf_map_area_alloc+0x6c/0x80 [ 696.494032][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 696.524058][T18686] array_map_alloc+0x53d/0xc70 [ 696.524058][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 696.524058][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 696.524058][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 696.524058][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 696.554026][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.554026][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.554026][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 696.554026][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.554026][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 696.584005][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.584005][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 696.584005][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.584005][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.584005][T18686] __se_sys_bpf+0x8e/0xa0 [ 696.584005][T18686] __ia32_sys_bpf+0x4a/0x70 [ 696.614035][T18686] __do_fast_syscall_32+0x127/0x180 [ 696.614035][T18686] do_fast_syscall_32+0x77/0xd0 [ 696.614035][T18686] do_SYSENTER_32+0x73/0x90 [ 696.614035][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 696.614035][T18686] RIP: 0023:0xf7fb4549 [ 696.614035][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 696.644572][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 696.644572][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 696.674022][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 696.674022][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 696.674022][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 696.674022][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 696.703998][T18686] [ 696.703998][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 696.703998][T18686] __bpf_prog_run32+0x84/0x190 [ 696.703998][T18686] __bpf_prog_run32+0x84/0x190 [ 696.703998][T18686] ===================================================== [ 696.733956][T18686] ===================================================== [ 696.740981][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 696.743909][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 696.743909][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.764075][T18686] Call Trace: [ 696.764075][T18686] dump_stack+0x24c/0x2e0 [ 696.764075][T18686] kmsan_report+0xfb/0x1e0 [ 696.764075][T18686] __msan_warning+0x5c/0xa0 [ 696.764075][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 696.764075][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 696.794063][T18686] __vmalloc_node_range+0xc83/0x1310 [ 696.794063][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 696.794063][T18686] __bpf_map_area_alloc+0x344/0x380 [ 696.794063][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 696.794063][T18686] bpf_map_area_alloc+0x6c/0x80 [ 696.794063][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 696.824001][T18686] array_map_alloc+0x53d/0xc70 [ 696.824001][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 696.824001][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 696.824001][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 696.824001][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 696.854041][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.854041][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.854041][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 696.854041][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.854041][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 696.884028][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.884028][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 696.884028][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.884028][T18686] ? kmsan_get_metadata+0x116/0x180 [ 696.884028][T18686] __se_sys_bpf+0x8e/0xa0 [ 696.884028][T18686] __ia32_sys_bpf+0x4a/0x70 [ 696.914036][T18686] __do_fast_syscall_32+0x127/0x180 [ 696.914036][T18686] do_fast_syscall_32+0x77/0xd0 [ 696.914036][T18686] do_SYSENTER_32+0x73/0x90 [ 696.914036][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 696.914036][T18686] RIP: 0023:0xf7fb4549 [ 696.914036][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 696.944084][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 696.944084][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 696.974032][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 696.974032][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 696.974032][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 696.974032][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 697.003995][T18686] [ 697.003995][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 697.003995][T18686] __bpf_prog_run32+0x84/0x190 [ 697.003995][T18686] __bpf_prog_run32+0x84/0x190 [ 697.003995][T18686] ===================================================== [ 697.034177][T18686] ===================================================== [ 697.041114][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 697.044128][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 697.044128][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.064070][T18686] Call Trace: [ 697.064070][T18686] dump_stack+0x24c/0x2e0 [ 697.064070][T18686] kmsan_report+0xfb/0x1e0 [ 697.064070][T18686] __msan_warning+0x5c/0xa0 [ 697.064070][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 697.064070][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 697.094069][T18686] __vmalloc_node_range+0xc83/0x1310 [ 697.094069][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 697.094069][T18686] __bpf_map_area_alloc+0x344/0x380 [ 697.094069][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 697.094069][T18686] bpf_map_area_alloc+0x6c/0x80 [ 697.094069][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.124136][T18686] array_map_alloc+0x53d/0xc70 [ 697.124136][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 697.124136][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 697.124136][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 697.124136][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 697.154070][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.154070][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.154070][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.154070][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.154070][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 697.184103][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.184103][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.184103][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.184103][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.184103][T18686] __se_sys_bpf+0x8e/0xa0 [ 697.184103][T18686] __ia32_sys_bpf+0x4a/0x70 [ 697.214007][T18686] __do_fast_syscall_32+0x127/0x180 [ 697.214007][T18686] do_fast_syscall_32+0x77/0xd0 [ 697.214007][T18686] do_SYSENTER_32+0x73/0x90 [ 697.214007][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 697.214007][T18686] RIP: 0023:0xf7fb4549 [ 697.214007][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 697.244082][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 697.244082][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 697.274066][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 697.274066][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 697.274066][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 697.274066][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 697.304037][T18686] [ 697.304037][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 697.304037][T18686] __bpf_prog_run32+0x84/0x190 [ 697.304037][T18686] __bpf_prog_run32+0x84/0x190 [ 697.304037][T18686] ===================================================== [ 697.334750][T18686] ===================================================== [ 697.341684][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 697.344701][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 697.344701][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.364062][T18686] Call Trace: [ 697.364062][T18686] dump_stack+0x24c/0x2e0 [ 697.364062][T18686] kmsan_report+0xfb/0x1e0 [ 697.364062][T18686] __msan_warning+0x5c/0xa0 [ 697.364062][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 697.364062][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 22:44:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x7c, 0x0, 0x0, 0x68000000}, {0x2}, {0x6}]}) [ 697.394016][T18686] __vmalloc_node_range+0xc83/0x1310 [ 697.394016][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 697.394016][T18686] __bpf_map_area_alloc+0x344/0x380 [ 697.394016][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 697.394016][T18686] bpf_map_area_alloc+0x6c/0x80 [ 697.424114][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.424114][T18686] array_map_alloc+0x53d/0xc70 [ 697.424114][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 697.424114][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 697.424114][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 697.424114][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 697.454342][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.454342][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.454342][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.454342][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.454342][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 697.483941][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.483941][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.483941][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.483941][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.483941][T18686] __se_sys_bpf+0x8e/0xa0 [ 697.483941][T18686] __ia32_sys_bpf+0x4a/0x70 [ 697.513945][T18686] __do_fast_syscall_32+0x127/0x180 [ 697.513945][T18686] do_fast_syscall_32+0x77/0xd0 [ 697.513945][T18686] do_SYSENTER_32+0x73/0x90 [ 697.513945][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 697.513945][T18686] RIP: 0023:0xf7fb4549 [ 697.513945][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 697.543920][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 697.543920][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 697.574026][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 697.574026][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 697.574026][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 697.574026][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 697.574026][T18686] [ 697.574026][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 697.574026][T18686] __bpf_prog_run32+0x84/0x190 [ 697.574026][T18686] __bpf_prog_run32+0x84/0x190 [ 697.574026][T18686] ===================================================== [ 697.634837][T18686] ===================================================== [ 697.641857][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 697.644793][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 697.644793][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.663967][T18686] Call Trace: [ 697.663967][T18686] dump_stack+0x24c/0x2e0 [ 697.663967][T18686] kmsan_report+0xfb/0x1e0 [ 697.663967][T18686] __msan_warning+0x5c/0xa0 [ 697.663967][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 697.663967][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 697.694122][T18686] __vmalloc_node_range+0xc83/0x1310 [ 697.694122][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 697.694122][T18686] __bpf_map_area_alloc+0x344/0x380 [ 697.694122][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 697.694122][T18686] bpf_map_area_alloc+0x6c/0x80 [ 697.724041][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.724041][T18686] array_map_alloc+0x53d/0xc70 [ 697.724041][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 697.724041][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 697.724041][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 697.724041][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 697.754115][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.754115][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.754115][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.754115][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.754115][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 697.783991][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.783991][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.783991][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.783991][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.783991][T18686] __se_sys_bpf+0x8e/0xa0 [ 697.783991][T18686] __ia32_sys_bpf+0x4a/0x70 [ 697.814030][T18686] __do_fast_syscall_32+0x127/0x180 [ 697.814030][T18686] do_fast_syscall_32+0x77/0xd0 [ 697.814030][T18686] do_SYSENTER_32+0x73/0x90 [ 697.814030][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 697.814030][T18686] RIP: 0023:0xf7fb4549 [ 697.814030][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 697.844050][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 697.844050][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 697.874034][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 697.874034][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 697.874034][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 697.874034][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 697.904027][T18686] [ 697.904027][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 697.904027][T18686] __bpf_prog_run32+0x84/0x190 [ 697.904027][T18686] __bpf_prog_run32+0x84/0x190 [ 697.904027][T18686] ===================================================== [ 697.937186][T18686] ===================================================== [ 697.944130][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 697.947133][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 697.947133][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.964044][T18686] Call Trace: [ 697.964044][T18686] dump_stack+0x24c/0x2e0 [ 697.964044][T18686] kmsan_report+0xfb/0x1e0 [ 697.964044][T18686] __msan_warning+0x5c/0xa0 [ 697.964044][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 697.964044][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 697.964044][T18686] __vmalloc_node_range+0xc83/0x1310 [ 697.964044][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 697.964044][T18686] __bpf_map_area_alloc+0x344/0x380 [ 697.964044][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 697.964044][T18686] bpf_map_area_alloc+0x6c/0x80 [ 697.964044][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.964044][T18686] array_map_alloc+0x53d/0xc70 [ 697.964044][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 697.964044][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 697.964044][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 697.964044][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 697.964044][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.964044][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.964044][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.964044][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.964044][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 697.964044][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.964044][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 697.964044][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.964044][T18686] ? kmsan_get_metadata+0x116/0x180 [ 697.964044][T18686] __se_sys_bpf+0x8e/0xa0 [ 697.964044][T18686] __ia32_sys_bpf+0x4a/0x70 [ 697.964044][T18686] __do_fast_syscall_32+0x127/0x180 [ 697.964044][T18686] do_fast_syscall_32+0x77/0xd0 [ 697.964044][T18686] do_SYSENTER_32+0x73/0x90 [ 697.964044][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 697.964044][T18686] RIP: 0023:0xf7fb4549 [ 697.964044][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 697.964044][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 697.964044][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 697.964044][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 697.964044][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 697.964044][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 697.964044][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 697.964044][T18686] [ 697.964044][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 697.964044][T18686] __bpf_prog_run32+0x84/0x190 [ 697.964044][T18686] __bpf_prog_run32+0x84/0x190 [ 697.964044][T18686] ===================================================== [ 698.238946][T18686] ===================================================== [ 698.245874][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 698.248900][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 698.263929][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.263929][T18686] Call Trace: [ 698.263929][T18686] dump_stack+0x24c/0x2e0 [ 698.263929][T18686] kmsan_report+0xfb/0x1e0 [ 698.263929][T18686] __msan_warning+0x5c/0xa0 [ 698.263929][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 698.294047][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 698.294047][T18686] __vmalloc_node_range+0xc83/0x1310 [ 698.294047][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 698.294047][T18686] __bpf_map_area_alloc+0x344/0x380 [ 698.294047][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 698.294047][T18686] bpf_map_area_alloc+0x6c/0x80 [ 698.324006][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 698.324006][T18686] array_map_alloc+0x53d/0xc70 [ 698.324006][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 698.324006][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 698.324006][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 698.354098][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 698.354098][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.354098][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.354098][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 698.354098][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.354098][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 698.384033][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.384033][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 698.384033][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.384033][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.384033][T18686] __se_sys_bpf+0x8e/0xa0 [ 698.414121][T18686] __ia32_sys_bpf+0x4a/0x70 [ 698.414121][T18686] __do_fast_syscall_32+0x127/0x180 [ 698.414121][T18686] do_fast_syscall_32+0x77/0xd0 [ 698.414121][T18686] do_SYSENTER_32+0x73/0x90 [ 698.414121][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 698.414121][T18686] RIP: 0023:0xf7fb4549 [ 698.443981][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 698.443981][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 698.443981][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 698.474021][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 698.474021][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 698.474021][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 698.504024][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 698.504024][T18686] [ 698.504024][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 698.504024][T18686] __bpf_prog_run32+0x84/0x190 [ 698.504024][T18686] __bpf_prog_run32+0x84/0x190 [ 698.504024][T18686] ===================================================== [ 698.538898][T18686] ===================================================== [ 698.545922][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 698.548847][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 698.563950][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.563950][T18686] Call Trace: [ 698.563950][T18686] dump_stack+0x24c/0x2e0 [ 698.563950][T18686] kmsan_report+0xfb/0x1e0 [ 698.563950][T18686] __msan_warning+0x5c/0xa0 [ 698.563950][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 698.594038][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 698.594038][T18686] __vmalloc_node_range+0xc83/0x1310 [ 698.594038][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 698.594038][T18686] __bpf_map_area_alloc+0x344/0x380 [ 698.594038][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 698.594038][T18686] bpf_map_area_alloc+0x6c/0x80 [ 698.624045][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 698.624045][T18686] array_map_alloc+0x53d/0xc70 [ 698.624045][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 698.624045][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 698.624045][T18686] __do_sys_bpf+0xf4d5/0x1aba0 [ 698.654486][T18686] ? kmsan_internal_set_origin+0x85/0xc0 [ 698.654486][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.654486][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.654486][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 698.654486][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.654486][T18686] ? kmsan_internal_check_memory+0xb5/0x520 [ 698.683949][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.683949][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 698.683949][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.683949][T18686] ? kmsan_get_metadata+0x116/0x180 [ 698.683949][T18686] __se_sys_bpf+0x8e/0xa0 [ 698.714153][T18686] __ia32_sys_bpf+0x4a/0x70 [ 698.714153][T18686] __do_fast_syscall_32+0x127/0x180 [ 698.714153][T18686] do_fast_syscall_32+0x77/0xd0 [ 698.714153][T18686] do_SYSENTER_32+0x73/0x90 [ 698.714153][T18686] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 698.714153][T18686] RIP: 0023:0xf7fb4549 [ 698.744027][T18686] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 698.744027][T18686] RSP: 002b:00000000f55ae5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 698.744027][T18686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000600 [ 698.774111][T18686] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 698.774111][T18686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 698.774111][T18686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 698.804048][T18686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 698.804048][T18686] [ 698.804048][T18686] Local variable ----regs@__bpf_prog_run32 created at: [ 698.804048][T18686] __bpf_prog_run32+0x84/0x190 [ 698.804048][T18686] __bpf_prog_run32+0x84/0x190 [ 698.804048][T18686] ===================================================== [ 698.839602][T18686] ===================================================== [ 698.846559][T18686] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 698.849551][T18686] CPU: 1 PID: 18686 Comm: syz-executor.2 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 698.863986][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.863986][T18686] Call Trace: [ 698.863986][T18686] dump_stack+0x24c/0x2e0 [ 698.863986][T18686] kmsan_report+0xfb/0x1e0 [ 698.863986][T18686] __msan_warning+0x5c/0xa0 [ 698.863986][T18686] __map_kernel_range_noflush+0xae4/0x11d0 [ 698.894593][T18686] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 698.894593][T18686] __vmalloc_node_range+0xc83/0x1310 [ 698.894593][T18686] ? bpf_map_area_alloc+0x50/0x80 [ 698.894593][T18686] __bpf_map_area_alloc+0x344/0x380 [ 698.894593][T18686] ? bpf_map_area_alloc+0x6c/0x80 [ 698.894593][T18686] bpf_map_area_alloc+0x6c/0x80 [ 698.894593][T18686] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 698.894593][T18686] array_map_alloc+0x53d/0xc70 [ 698.894593][T18686] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 698.894593][T18686] ? bpf_percpu_array_update+0xcd0/0xcd0 [ 698.894593][T18686] __do_sys_bpf+0xf4d5/0x1aba0