[ 37.321162][ T26] audit: type=1800 audit(1548847766.529:27): pid=7597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 37.341900][ T26] audit: type=1800 audit(1548847766.529:28): pid=7597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.227576][ T26] audit: type=1800 audit(1548847767.489:29): pid=7597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [....] startpar: service(s) returned failure: ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.40' (ECDSA) to the list of known hosts. 2019/01/30 11:29:37 fuzzer started 2019/01/30 11:29:40 dialing manager at 10.128.0.26:43669 2019/01/30 11:29:40 syscalls: 1 2019/01/30 11:29:40 code coverage: enabled 2019/01/30 11:29:40 comparison tracing: enabled 2019/01/30 11:29:40 extra coverage: extra coverage is not supported by the kernel 2019/01/30 11:29:40 setuid sandbox: enabled 2019/01/30 11:29:40 namespace sandbox: enabled 2019/01/30 11:29:40 Android sandbox: /sys/fs/selinux/policy does not exist 2019/01/30 11:29:40 fault injection: enabled 2019/01/30 11:29:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/01/30 11:29:40 net packet injection: enabled 2019/01/30 11:29:40 net device setup: enabled 11:32:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) syzkaller login: [ 212.534491][ T7782] IPVS: ftp: loaded support on port[0] = 21 11:32:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) memfd_create(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) mq_notify(0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) clone(0x8000002102001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x37, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, &(0x7f0000000440)={'syz', 0x0}, 0x0, 0xfffffffffffffffd) r1 = getpgid(0xffffffffffffffff) ptrace$getregset(0x4204, r1, 0x0, 0x0) add_key(&(0x7f0000000880)='keyring\x006\xf9\x12l\x12\x05O\\\x0e\x18\xc6R%s\xddy\xf1\xa0\xa3\xa6\tW\xd6\xc7)\xad\x85l\xd8\xf0\xdf\x9c\x04\xd1\x8eW\x90K\x1c\x05 \x9d\xee\x12\xf5\xcc\xc1-\x98\xa7\x007g46a\x0f\xaa\xc8\x8b\xcf\x96\x81\x91\x87\x89\xc2\xadG6e\x98K\x17\x86\x8d\x9c^\x90\x81>\x9e\xc1\xf7?\xde\xbfV8\xf9\xc0\x1f\x88!\xf1\xf7\x8e\xba\xc9\x84\xe3\x85.\xe1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) [ 212.653497][ T7782] chnl_net:caif_netlink_parms(): no params data found [ 212.761669][ T7782] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.769398][ T7782] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.783295][ T7782] device bridge_slave_0 entered promiscuous mode [ 212.792222][ T7782] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.799331][ T7782] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.808654][ T7782] device bridge_slave_1 entered promiscuous mode [ 212.835897][ T7782] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 212.847241][ T7782] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 212.850836][ T7785] IPVS: ftp: loaded support on port[0] = 21 [ 212.901850][ T7782] team0: Port device team_slave_0 added [ 212.908980][ T7782] team0: Port device team_slave_1 added 11:32:22 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x6}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f00003e1000/0x3000)=nil, 0x3000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x17b) [ 212.996115][ T7782] device hsr_slave_0 entered promiscuous mode [ 213.062045][ T7782] device hsr_slave_1 entered promiscuous mode 11:32:22 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='/\xbb\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000013}) [ 213.138115][ T7787] IPVS: ftp: loaded support on port[0] = 21 [ 213.154651][ T7782] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.162089][ T7782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.170112][ T7782] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.177338][ T7782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.398762][ T7785] chnl_net:caif_netlink_parms(): no params data found [ 213.402063][ T7790] IPVS: ftp: loaded support on port[0] = 21 [ 213.526222][ T7782] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.553240][ T7787] chnl_net:caif_netlink_parms(): no params data found [ 213.573735][ T7785] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.582892][ T7785] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.593223][ T7785] device bridge_slave_0 entered promiscuous mode 11:32:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, 0x0) [ 213.622462][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.637099][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.657134][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.672309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 213.685937][ T7785] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.697655][ T7785] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.731330][ T7785] device bridge_slave_1 entered promiscuous mode [ 213.776221][ T7782] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.807812][ T7795] IPVS: ftp: loaded support on port[0] = 21 [ 213.841793][ T7785] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.896180][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.909195][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.918130][ T7792] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.925244][ T7792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.940209][ T7785] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.972276][ T7787] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.979377][ T7787] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.991769][ T7787] device bridge_slave_0 entered promiscuous mode [ 214.008895][ T7785] team0: Port device team_slave_0 added [ 214.016535][ T7785] team0: Port device team_slave_1 added 11:32:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 215.612677][ T7785] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.624713][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.632980][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.683695][ T7795] device hsr_slave_0 entered promiscuous mode [ 215.704403][ T7795] device hsr_slave_1 entered promiscuous mode [ 215.761261][ T7799] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.768494][ T7799] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.776510][ T7799] device bridge_slave_0 entered promiscuous mode [ 215.784493][ T7799] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.791708][ T7799] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.799539][ T7799] device bridge_slave_1 entered promiscuous mode [ 215.823696][ T7787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.844049][ T7799] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.859985][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 11:32:25 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xcf, 0x4003f}) [ 215.868058][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.888461][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.903874][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.919167][ T7822] vhci_hcd: invalid port number 63 [ 215.924619][ T7822] vhci_hcd: default hub control req: cf00 v0000 i003f l4 [ 215.925448][ T3472] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.938873][ T3472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.951302][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.960872][ T7787] 8021q: adding VLAN 0 to HW filter on device team0 11:32:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xac9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000180), 0x4) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000040)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) [ 215.981993][ T7799] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.033937][ T7799] team0: Port device team_slave_0 added [ 216.042537][ T7799] team0: Port device team_slave_1 added [ 216.050185][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.059239][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.067635][ T7798] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.074709][ T7798] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.084489][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.115480][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.124748][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.133508][ T7792] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.140657][ T7792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.148567][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.157531][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.166118][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.176171][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.184564][ T7792] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.191642][ T7792] bridge0: port 2(bridge_slave_1) entered forwarding state 11:32:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1e80730000000000000000000008000000008ff1ac460000000000001c0000004e2311b580fbf94ad38c43937aad9a859e63e9b1a3abe483a708e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa24"], 0x51) write$binfmt_elf64(r2, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x7b0) [ 216.263708][ T7799] device hsr_slave_0 entered promiscuous mode [ 216.321277][ T7799] device hsr_slave_1 entered promiscuous mode [ 216.383178][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.392398][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.401209][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.409467][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.418316][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.426783][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.435312][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.443915][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.452460][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.460807][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.471528][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.479357][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.499112][ T7787] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.517703][ T7787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.533424][ T7790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.558903][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.568900][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.578017][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.586552][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.595281][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.603624][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 11:32:25 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) [ 216.631720][ T7787] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.648728][ T7785] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.669681][ T7785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.678309][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.687070][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.749308][ T7790] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.789309][ T7795] 8021q: adding VLAN 0 to HW filter on device bond0 11:32:26 executing program 0: clone(0x20802100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000100)={'sy.'}, 0x0, r0) [ 216.815331][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.827524][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.874654][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.886357][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.895711][ T2979] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.902870][ T2979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.925968][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.935360][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.944448][ T2979] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.951575][ T2979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.960068][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.969584][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.984473][ T7795] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.009579][ T7785] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.017643][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.026573][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.034900][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.043197][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.052362][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.060824][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.071620][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.079813][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.088286][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.096480][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.104623][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.129989][ T7790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.140783][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.148405][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.157092][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.165684][ T7792] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.172791][ T7792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.180275][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.189151][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.197958][ T7792] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.205099][ T7792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.213664][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.244791][ T7824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.274370][ T7824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.294052][ T7824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.302912][ T7824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.311745][ T7824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.320148][ T7824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.336774][ T7790] 8021q: adding VLAN 0 to HW filter on device batadv0 11:32:26 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x200000000008901, &(0x7f0000000040)={'bcsh0\x00', @ifru_flags}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 11:32:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000000)="9af6", 0x2, 0x0, 0x0, 0x0) [ 217.362670][ T7799] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.369632][ T7824] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.386243][ T7824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.396248][ T7824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.420652][ T7795] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 217.462194][ T7795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.497458][ T7799] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.509308][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.518820][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.527855][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.535810][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:32:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) [ 217.568828][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.580255][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.601921][ T2979] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.609249][ T2979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.642429][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.651415][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.666808][ T2979] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.673908][ T2979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.682054][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.709582][ T7795] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.730257][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.739713][ T7874] mkiss: ax0: crc mode is auto. [ 217.745690][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.864761][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.890665][ T7874] mkiss: ax0: crc mode is auto. [ 217.898326][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.910866][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.919513][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.937436][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.960977][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.978273][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.995960][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.015993][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.047437][ T7792] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.130056][ T7799] 8021q: adding VLAN 0 to HW filter on device batadv0 11:32:27 executing program 4: 11:32:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigaction(0x11, 0x0, 0x0, 0x8, &(0x7f0000000240)) 11:32:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) 11:32:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_proto_private(r1, 0x89e0, 0x0) 11:32:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) write$P9_RGETATTR(r2, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000040)) [ 218.550841][ T7912] mkiss: ax0: crc mode is auto. 11:32:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:27 executing program 2: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000180)=0x7, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x10) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:32:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) pipe(&(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 11:32:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f00000001c0)) 11:32:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x70a000) [ 219.158928][ T7962] mkiss: ax2: crc mode is auto. [ 219.190633][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 219.196454][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 219.389997][ T7982] mkiss: ax0: crc mode is auto. 11:32:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000000)=[0xffffffffffffffff, 0xee01]) setgid(r1) 11:32:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) [ 221.229487][ T8079] mkiss: ax0: crc mode is auto. 11:32:30 executing program 0: syz_execute_func(&(0x7f00000004c0)="3666440f50f564ff0941c3c4e2c9975842794e2e3e420f3806d0f7450fa008080f11103d0d0000003e470f01d4") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 11:32:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00\xca\x06A/\xd3,0mQ\xce}jW\xc7~F\x0f\x92\x95\xf4\vn\xc3ZV\xfc\xc7@\xda ~\x15,+6C\x14\xa1D1\xa1\xcf\xad\xa7J\xa7\x81\x06\xda\xd1W\xd8\x05C\xc7\xaf\x83{s\x12\x14\x91<\xd8\x13\xf0\xfa\x90}\x80 %\xe2\x05\x97\x84\xfc2\xa9\xca\x98Z\a\xb0%\xdd\f\xf4I> \x9b\x01\xdc\xbc\xebc\xe5/\x96\x83P\xd1\xc7I\x13s\x03\x00\f') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000)=0x10, 0x6f8) 11:32:30 executing program 2: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x30}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:32:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) write(r1, &(0x7f0000000800)='4', 0x1) 11:32:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) [ 221.877738][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 221.877751][ T26] audit: type=1800 audit(1548847951.139:31): pid=8133 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor2" name="file0" dev="sda1" ino=16575 res=0 11:32:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x6, 0x0, 0x0, {}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d5db64275bd004c0"}}, 0x48}}, 0x0) 11:32:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:31 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x73fffa) 11:32:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00\xca\x06A/\xd3,0mQ\xce}jW\xc7~F\x0f\x92\x95\xf4\vn\xc3ZV\xfc\xc7@\xda ~\x15,+6C\x14\xa1D1\xa1\xcf\xad\xa7J\xa7\x81\x06\xda\xd1W\xd8\x05C\xc7\xaf\x83{s\x12\x14\x91<\xd8\x13\xf0\xfa\x90}\x80 %\xe2\x05\x97\x84\xfc2\xa9\xca\x98Z\a\xb0%\xdd\f\xf4I> \x9b\x01\xdc\xbc\xebc\xe5/\x96\x83P\xd1\xc7I\x13s\x03\x00\f') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000)=0x10, 0x6f8) 11:32:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000080, 0x0, 0x0, 0x8, 0x0, 0x7fff}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11:32:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) dup3(r2, r1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') dup3(r1, r3, 0x0) sendmmsg$unix(r3, &(0x7f0000003200)=[{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000380)='\r', 0x1}], 0x1, 0x0, 0x0, 0x4}], 0x1, 0x8000) [ 222.310817][ T8153] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 222.405597][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:32:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00\xca\x06A/\xd3,0mQ\xce}jW\xc7~F\x0f\x92\x95\xf4\vn\xc3ZV\xfc\xc7@\xda ~\x15,+6C\x14\xa1D1\xa1\xcf\xad\xa7J\xa7\x81\x06\xda\xd1W\xd8\x05C\xc7\xaf\x83{s\x12\x14\x91<\xd8\x13\xf0\xfa\x90}\x80 %\xe2\x05\x97\x84\xfc2\xa9\xca\x98Z\a\xb0%\xdd\f\xf4I> \x9b\x01\xdc\xbc\xebc\xe5/\x96\x83P\xd1\xc7I\x13s\x03\x00\f') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000)=0x10, 0x6f8) 11:32:31 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x73fffa) [ 222.472659][ T8157] mkiss: ax0: crc mode is auto. 11:32:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f00007a8000)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000000107ffff000000020000000000000000"], 0x14}}, 0x0) 11:32:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/117, 0x75}], 0x1, 0x2e) 11:32:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff, 0xffffffffffffffff}, 0x80000) fsync(r0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x7, 0x4) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000080)=0x9, 0x4) dup2(r1, r0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "1f2ea0ff1f81cc2fae5c004f66a2b2fc"}, 0x11, 0x2) socket$netlink(0x10, 0x3, 0x2) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f0000000740)) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000780)={'security\x00'}, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f0000000880)=0x5) fsetxattr$security_ima(r0, &(0x7f00000008c0)='security.ima\x00', &(0x7f0000000900)=@ng={0x4, 0x0, "caa7"}, 0x4, 0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000009c0), &(0x7f0000000a00)=0x30) write$cgroup_type(r1, 0x0, 0x0) 11:32:32 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x73fffa) 11:32:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000180)=0x3180000000) read(r0, &(0x7f0000000040)=""/11, 0xffffff3a) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 11:32:32 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:32:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x400000006}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) sendto$inet6(r0, 0x0, 0xce, 0xfefffffffffffffc, 0x0, 0xfffffffffffffe11) 11:32:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpriority(0x0, 0x0) 11:32:32 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod(&(0x7f00000000c0)='./file0\x00', 0x1041, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) clone(0x802102201ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'veth1Tto_bond\x00', 0x3802}) close(r1) creat(&(0x7f0000000140)='./file0\x00', 0x0) 11:32:33 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'eql\x00', 0x8a0a}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r2, &(0x7f0000000100)=[{&(0x7f00000012c0)=""/217, 0x3}], 0x1, 0x0) dup2(r3, r2) ioctl$sock_ifreq(r1, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) 11:32:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) [ 224.562806][ T8309] mkiss: ax0: crc mode is auto. 11:32:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x200000000008901, &(0x7f0000000040)={'bcsh0\x00', @ifru_flags}) 11:32:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:33 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x73fffa) 11:32:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:35 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x73fffa) 11:32:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x73fffa) 11:32:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x73fffa) 11:32:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:36 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x73fffa) 11:32:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) [ 228.236725][ T8559] mkiss: ax0: crc mode is auto. 11:32:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00\xca\x06A/\xd3,0mQ\xce}jW\xc7~F\x0f\x92\x95\xf4\vn\xc3ZV\xfc\xc7@\xda ~\x15,+6C\x14\xa1D1\xa1\xcf\xad\xa7J\xa7\x81\x06\xda\xd1W\xd8\x05C\xc7\xaf\x83{s\x12\x14\x91<\xd8\x13\xf0\xfa\x90}\x80 %\xe2\x05\x97\x84\xfc2\xa9\xca\x98Z\a\xb0%\xdd\f\xf4I> \x9b\x01\xdc\xbc\xebc\xe5/\x96\x83P\xd1\xc7I\x13s\x03\x00\f') sendfile(r2, r1, &(0x7f0000000000)=0x10, 0x6f8) 11:32:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x0) 11:32:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00\xca\x06A/\xd3,0mQ\xce}jW\xc7~F\x0f\x92\x95\xf4\vn\xc3ZV\xfc\xc7@\xda ~\x15,+6C\x14\xa1D1\xa1\xcf\xad\xa7J\xa7\x81\x06\xda\xd1W\xd8\x05C\xc7\xaf\x83{s\x12\x14\x91<\xd8\x13\xf0\xfa\x90}\x80 %\xe2\x05\x97\x84\xfc2\xa9\xca\x98Z\a\xb0%\xdd\f\xf4I> \x9b\x01\xdc\xbc\xebc\xe5/\x96\x83P\xd1\xc7I\x13s\x03\x00\f') sendfile(r2, r1, &(0x7f0000000000)=0x10, 0x6f8) [ 228.632563][ T8582] mkiss: ax0: crc mode is auto. [ 228.671369][ T8590] mkiss: ax1: crc mode is auto. 11:32:38 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x0) 11:32:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00\xca\x06A/\xd3,0mQ\xce}jW\xc7~F\x0f\x92\x95\xf4\vn\xc3ZV\xfc\xc7@\xda ~\x15,+6C\x14\xa1D1\xa1\xcf\xad\xa7J\xa7\x81\x06\xda\xd1W\xd8\x05C\xc7\xaf\x83{s\x12\x14\x91<\xd8\x13\xf0\xfa\x90}\x80 %\xe2\x05\x97\x84\xfc2\xa9\xca\x98Z\a\xb0%\xdd\f\xf4I> \x9b\x01\xdc\xbc\xebc\xe5/\x96\x83P\xd1\xc7I\x13s\x03\x00\f') sendfile(r2, r1, &(0x7f0000000000)=0x10, 0x6f8) 11:32:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) [ 229.154798][ T8625] mkiss: ax0: crc mode is auto. [ 229.221543][ T8633] mkiss: ax1: crc mode is auto. 11:32:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0edd0000f9ff06bfc7cf0d380000000000000000002d00267dffaa6f66b34cd4535a6021598f0a3665cdfb2c3bed96ca80740db132b356a492"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x7, 0x0, 0x9}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) gettid() ptrace$cont(0x1f, r1, 0x0, 0x0) 11:32:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x80000000, 0x4) 11:32:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) [ 233.750756][ T8913] hfsplus: unable to find HFS+ superblock [ 233.838935][ T8917] hfsplus: unable to find HFS+ superblock [ 233.944514][ T8924] mkiss: ax0: crc mode is auto. 11:32:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 11:32:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:43 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) [ 234.230506][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 234.236525][ C1] protocol 88fb is buggy, dev hsr_slave_1 11:32:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:44 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00\xc0\xe6\xff\x01\xb2\x19\x02j\x1c\xb7\xe0g\xf3\xc5\x12Dhii=\x1b.\x8b\xd4\x9dh\xbd\xbc\x91Q\x14\xe4\xc7C\xa1?-\xdc\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:32:46 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8924, 0x940000) 11:32:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:46 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) [ 237.712288][ T9036] mkiss: ax0: crc mode is auto. 11:32:47 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) [ 237.751329][ T9040] hfs: can't find a HFS filesystem on dev loop3 [ 237.776061][ T9036] mkiss: ax0: crc mode is auto. [ 237.836349][ T9050] hfs: can't find a HFS filesystem on dev loop3 11:32:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000080001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2}, 0x10) socket(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0xdf) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xffffff0f}], 0x1, &(0x7f0000000200)=""/20, 0xffffffffffffff62}, 0x100) 11:32:47 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:47 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x10) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 11:32:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:47 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:47 executing program 3: ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={&(0x7f0000000000), 0xc, &(0x7f0000001280)={&(0x7f0000000780)=ANY=[@ANYBLOB="00000000000000001800120008000100736974000c00020008000a00769ffb5ec8449a682c48f7839330754f08146b6ca989fece40c7d5", @ANYRES32=0x0], 0x2}}, 0x0) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) connect$l2tp(r1, 0x0, 0x0) 11:32:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$GETZCNT(0x0, 0x0, 0xf, 0x0) 11:32:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1, 0x1f6) 11:32:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:48 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8910, 0x0) 11:32:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$TCFLSH(r0, 0x8925, 0x73fffa) 11:32:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140)="b127e17bb4729bdbe9df3309c28cfe1b0b69a52b7f9659d9f5e15f2d086700eb94", 0x0}, 0x20) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x50, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[0x11], [], @multicast1}, @in6=@dev}}}, 0x50}}, 0x0) 11:32:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) [ 239.451685][ T9148] mkiss: ax0: crc mode is auto. 11:32:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x73fffa) [ 239.495674][ T9148] mkiss: ax1: crc mode is auto. 11:32:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xff22}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006190000000000000089800000000000e0000001070000000000000000003500000000fc00000000000000ff0000000090e906000000000002000004000000bb000000000000000003000500000000000200423b000000000000004000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 11:32:48 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8910, 0x0) [ 239.708065][ T9182] mkiss: ax0: crc mode is auto. 11:32:49 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) [ 239.913918][ T9195] mkiss: ax0: crc mode is auto. 11:32:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x73fffa) 11:32:49 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000080)=""/128, 0xae3f1a6) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:32:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8910, 0x0) 11:32:49 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) [ 240.374434][ T9219] mkiss: ax0: crc mode is auto. [ 240.451926][ T9221] mkiss: ax1: crc mode is auto. 11:32:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:49 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x73fffa) 11:32:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x800000000000014, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) 11:32:50 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) [ 241.163693][ T9262] mkiss: ax0: crc mode is auto. 11:32:50 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001100)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000100)="8ec1b91e6d8b56d111617531f66a118c8b8e4150b876c09dc714bac5b4594be164bcf4e7dde006dd2af814c697c478ffb5edd32ff7db6df6994c49030b487a1f6e4c1f7df703a946f572c04a5aef4d1a149a8d207ca3b31f8ba9e439633a5fdaac7f1669d21277de8001a158ee444842e111379e0ed7f37ed4afab616ff1d6aeda5ddda5fcf7ff1522ea3b5d761051f838183a22d3a35293053317092e74d827d595416667540ca8eae5e4925820e41b4d1fe6dc25", 0xb5}, 0x68) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{}, {0x0, @link_local}, 0x0, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) 11:32:50 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:50 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x0) [ 241.859304][ T9305] mkiss: ax0: crc mode is auto. 11:32:51 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = dup(r0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x21, 0x0, 0x0) 11:32:51 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe004, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027000f8", 0x16}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 11:32:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x0) 11:32:51 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:51 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) [ 242.776816][ T9331] mkiss: ax0: crc mode is auto. 11:32:52 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f00000000c0)}, 0x78) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:52 executing program 3: socketpair$unix(0x1, 0x10000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 11:32:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$cgroup_type(r2, &(0x7f00000000c0)='threaded\x00', 0x9) write$binfmt_aout(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='p'], 0x1) 11:32:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8925, 0x0) 11:32:52 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f00000000c0)}, 0x78) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) [ 243.073149][ T9370] mkiss: ax0: crc mode is auto. 11:32:52 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f00000000c0)}, 0x78) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:52 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 11:32:52 executing program 3: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, [{}, {}]}, 0x48) 11:32:52 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:52 executing program 3: 11:32:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:52 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:53 executing program 3: 11:32:53 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={&(0x7f0000000000), 0xc, &(0x7f0000001280)={&(0x7f0000000780)=ANY=[@ANYBLOB="00000000000000001800120008000100736974000c00020008000a00769ffb5ec8449a682c48f7839330754f08146b6ca989fece40c7d5", @ANYRES32=0x0], 0x2}}, 0x0) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) 11:32:53 executing program 3: 11:32:53 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:53 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000380)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 11:32:53 executing program 1: 11:32:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:53 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:53 executing program 3: 11:32:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:53 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:53 executing program 1: 11:32:53 executing program 3: 11:32:53 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:53 executing program 3: 11:32:53 executing program 1: 11:32:54 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:54 executing program 1: 11:32:54 executing program 3: 11:32:54 executing program 1: 11:32:54 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:54 executing program 3: 11:32:54 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:54 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:54 executing program 1: 11:32:54 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:54 executing program 5: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:54 executing program 3: 11:32:54 executing program 1: 11:32:54 executing program 5: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:54 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:54 executing program 3: 11:32:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:55 executing program 1: 11:32:55 executing program 3: 11:32:55 executing program 5: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:55 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:55 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:55 executing program 3: 11:32:55 executing program 1: 11:32:55 executing program 5: r0 = syz_open_dev$usb(0x0, 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:55 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:55 executing program 1: 11:32:55 executing program 3: 11:32:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:56 executing program 5: r0 = syz_open_dev$usb(0x0, 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:56 executing program 1: 11:32:56 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:56 executing program 3: 11:32:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r1, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:56 executing program 3: 11:32:56 executing program 1: 11:32:56 executing program 5: r0 = syz_open_dev$usb(0x0, 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:56 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0), 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:56 executing program 3: 11:32:56 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:57 executing program 3: 11:32:57 executing program 1: 11:32:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:57 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:57 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0), 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:57 executing program 3: 11:32:57 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:57 executing program 1: 11:32:57 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0), 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:57 executing program 3: 11:32:57 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:57 executing program 1: 11:32:57 executing program 3: 11:32:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:58 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:58 executing program 1: 11:32:58 executing program 3: 11:32:58 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:58 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:58 executing program 3: 11:32:58 executing program 1: 11:32:58 executing program 5: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:58 executing program 1: 11:32:58 executing program 3: 11:32:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:59 executing program 1: 11:32:59 executing program 5: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:59 executing program 3: 11:32:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:32:59 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:32:59 executing program 3: 11:32:59 executing program 1: 11:32:59 executing program 5: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000, 0x0, 0x0, 0x70a000}) 11:32:59 executing program 3: 11:32:59 executing program 1: 11:32:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, 0x0) 11:33:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:00 executing program 3: 11:33:00 executing program 1: 11:33:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, 0x0) 11:33:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:00 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:33:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, 0x0) 11:33:00 executing program 3: 11:33:00 executing program 1: 11:33:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x0, 0x100000, 0x0, 0x0, 0x70a000}) 11:33:00 executing program 3: 11:33:00 executing program 1: [ 251.012674][ T9722] vhci_hcd: default hub control req: 0000 v0000 i0000 l16 11:33:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:00 executing program 3: 11:33:00 executing program 1: 11:33:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x0, 0x100000, 0x0, 0x0, 0x70a000}) 11:33:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:00 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:33:01 executing program 3: 11:33:01 executing program 1: [ 251.706656][ T9739] vhci_hcd: default hub control req: 0000 v0000 i0000 l16 11:33:01 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x0, 0x100000, 0x0, 0x0, 0x70a000}) 11:33:01 executing program 3: 11:33:01 executing program 1: 11:33:01 executing program 3: [ 251.884022][ T9751] vhci_hcd: default hub control req: 0000 v0000 i0000 l16 11:33:01 executing program 3: 11:33:01 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x0, 0x0, 0x0, 0x70a000}) 11:33:01 executing program 1: 11:33:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:01 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:33:01 executing program 3: 11:33:01 executing program 1: 11:33:01 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x0, 0x0, 0x0, 0x70a000}) 11:33:02 executing program 3: 11:33:02 executing program 1: 11:33:02 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x0, 0x0, 0x0, 0x70a000}) 11:33:02 executing program 3: 11:33:02 executing program 1: 11:33:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:02 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000}) 11:33:02 executing program 3: 11:33:02 executing program 1: 11:33:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:02 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:33:02 executing program 3: 11:33:02 executing program 1: 11:33:02 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000}) 11:33:02 executing program 3: 11:33:02 executing program 1: 11:33:02 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x100000}) 11:33:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:03 executing program 3: 11:33:03 executing program 1: 11:33:03 executing program 5: 11:33:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:03 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:33:03 executing program 3: 11:33:03 executing program 1: 11:33:03 executing program 5: 11:33:03 executing program 3: 11:33:03 executing program 1: 11:33:03 executing program 5: 11:33:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:04 executing program 3: 11:33:04 executing program 1: 11:33:04 executing program 5: 11:33:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:04 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:33:04 executing program 1: 11:33:04 executing program 5: 11:33:04 executing program 3: 11:33:04 executing program 1: 11:33:04 executing program 3: 11:33:04 executing program 5: 11:33:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:05 executing program 1: 11:33:05 executing program 5: 11:33:05 executing program 3: 11:33:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:05 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:33:05 executing program 3: 11:33:05 executing program 5: 11:33:05 executing program 1: 11:33:05 executing program 5: 11:33:05 executing program 3: 11:33:05 executing program 1: 11:33:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:06 executing program 5: 11:33:06 executing program 3: 11:33:06 executing program 1: 11:33:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:06 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:33:06 executing program 3: 11:33:06 executing program 1: 11:33:06 executing program 5: 11:33:06 executing program 3: 11:33:06 executing program 1: 11:33:06 executing program 5: 11:33:07 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7ff, 0x800) openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1fe, 0x163882) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x84840, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1f, 0x8000000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000006000)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000340)="fa082bb524cf374d", 0x8}], 0x1, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000740)=""/246) clock_gettime(0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000580)={&(0x7f0000000540)={0x7}, 0x8}) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0xf) close(r1) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000380)={{0x800, 0x7, 0x0, 0x6}, 'syz0\x00', 0x22}) getpgrp(0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x70, 0x74, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r2, 0x4010744d, &(0x7f0000001000)=""/174) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000240), &(0x7f0000000440)=0x10) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x3a, @rand_addr=0x800, 0x4e20, 0x3, 'sh\x00', 0x1, 0x0, 0x1}, {@multicast1, 0x81, 0x0, 0x6, 0x4ec, 0x4}}, 0x44) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)) syz_open_dev$sg(0x0, 0x0, 0x3f00) r3 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="7365637572697479000000000000000000000000000000000000000000000000ae000000bc671c091616deef4ad9d07f25cf9e386be80a47699c9f10e4d5c4660c3f2ad00cca68a1f8c7f79cee1f28455196714a5d87e5bc2f47723fc993db58b51a1f106bc682886f0d6e895186d4c11b7c908739d326d0af231694000000000e6d1cf1d3f886eb2f8e8f5abef524fdaaeccd1252a12373b0444a315f29f7f18812e5c6fa623af96c3bb91bbf104e73993a1efff98604762fa7aca77651bc4437a2d9693152132bf109dec5aec5a19da5fc"], 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000100)) 11:33:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) chroot(&(0x7f0000000000)='./file0\x00') 11:33:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:07 executing program 1: 11:33:07 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000000c0), 0x2a1, 0x44000102, 0x0) 11:33:07 executing program 1: 11:33:07 executing program 5: 11:33:07 executing program 3: 11:33:07 executing program 1: 11:33:07 executing program 5: syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000340)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x10000000000000ea) 11:33:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x10, 0x3, 0x9) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000340807031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e280000005304ffffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 11:33:07 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='io\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendfile(r2, r0, 0x0, 0x80000000000000) [ 258.343362][ T26] audit: type=1107 audit(1548847987.609:35): pid=9976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='VÚZ€Ñ‹ãL…FÈ$9)Û$² Ó~ÐÀ' [ 258.396235][ T26] audit: type=1107 audit(1548847987.609:36): pid=9976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='VÚZ€Ñ‹ãL…FÈ$9)Û$² Ó~ÐÀ©T' [ 258.550565][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 258.556551][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 258.710483][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 258.716934][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 258.726453][ T9974] syz-executor5 (9974) used greatest stack depth: 18936 bytes left 11:33:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ab9919ec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x1000001e2) recvmmsg(r2, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c00)=""/111, 0x6f}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000dc0)=""/168, 0xa8}], 0x3}}], 0x1, 0x0, 0x0) 11:33:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000000100)="305ae9df56b33f3471d4bce35dab7ab252f797ef7787d5b93a6f105675e6b938da1d3ea3473b150b2e1996c7a25c341551cb0aa21ce2592389f564398e010f40b1e30ba3844fd1b7fc55264f656a404cabd1438b7a925ff5340bb11552832dc92dfe83d7e86584a4f223d05a6554a074dd5abaa48b5f828f4a96577b74a3a1a6872f436915242d8e451a85cf2b9e7058", 0x90) write$cgroup_type(r1, 0x0, 0x0) 11:33:08 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='io\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendfile(r2, r0, 0x0, 0x80000000000000) 11:33:08 executing program 5: syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000340)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x10000000000000ea) [ 258.825620][ T9988] ================================================================== [ 258.833890][ T9988] BUG: KASAN: null-ptr-deref in reclaim_high.constprop.0+0xa6/0x1e0 [ 258.841870][ T9988] Read of size 8 at addr 0000000000000138 by task syz-executor5/9988 [ 258.841877][ T9988] [ 258.841892][ T9988] CPU: 1 PID: 9988 Comm: syz-executor5 Not tainted 5.0.0-rc4-next-20190130 #22 [ 258.841900][ T9988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.841906][ T9988] Call Trace: [ 258.841931][ T9988] dump_stack+0x1db/0x2d0 [ 258.841947][ T9988] ? dump_stack_print_info.cold+0x20/0x20 [ 258.841960][ T9988] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 258.841974][ T9988] ? vprintk_func+0x86/0x189 [ 258.841984][ T9988] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 258.841994][ T9988] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 258.842020][ T9988] kasan_report.cold+0x5/0x40 [ 258.842036][ T9988] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 258.852557][ T9988] check_memory_region+0x123/0x190 [ 258.852576][ T9988] kasan_check_read+0x11/0x20 [ 258.852590][ T9988] reclaim_high.constprop.0+0xa6/0x1e0 [ 258.852605][ T9988] ? lockdep_hardirqs_on+0x418/0x5d0 [ 258.852625][ T9988] ? memcg_oom_wake_function+0x6b0/0x6b0 [ 258.942824][ T9988] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 258.948292][ T9988] ? syscall_return_slowpath+0x519/0x5f0 [ 258.953931][ T9988] ? trace_hardirqs_off_caller+0x300/0x300 [ 258.959752][ T9988] ? lockdep_hardirqs_on+0x418/0x5d0 [ 258.965052][ T9988] ? retint_kernel+0x2d/0x2d [ 258.969697][ T9988] mem_cgroup_handle_over_high+0xc1/0x180 [ 258.975431][ T9988] exit_to_usermode_loop+0x299/0x3b0 [ 258.980718][ T9988] ? ret_from_fork+0x15/0x50 [ 258.985317][ T9988] ? syscall_trace_enter+0x12a0/0x12a0 [ 258.990775][ T9988] ? _raw_spin_unlock_irq+0x28/0x90 [ 258.995983][ T9988] ? lockdep_hardirqs_on+0x418/0x5d0 [ 259.001279][ T9988] syscall_return_slowpath+0x519/0x5f0 [ 259.006742][ T9988] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 259.012475][ T9988] ? _raw_spin_unlock_irq+0x5e/0x90 [ 259.017676][ T9988] ret_from_fork+0x15/0x50 [ 259.022105][ T9988] RIP: 0033:0x45665a [ 259.026020][ T9988] Code: Bad RIP value. [ 259.030096][ T9988] RSP: 002b:00007fff0c940ac0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 259.038526][ T9988] RAX: 0000000000000000 RBX: 00007fff0c940ac0 RCX: 000000000045665a [ 259.046517][ T9988] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 259.054496][ T9988] RBP: 00007fff0c940b00 R08: 0000000000000001 R09: 00000000016e9940 [ 259.062469][ T9988] R10: 00000000016e9c10 R11: 0000000000000246 R12: 0000000000000001 [ 259.070442][ T9988] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 259.078434][ T9988] ================================================================== [ 259.086529][ T9988] Disabling lock debugging due to kernel taint [ 259.092962][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 259.098729][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 259.119902][ T9988] Kernel panic - not syncing: panic_on_warn set ... [ 259.126539][ T9988] CPU: 1 PID: 9988 Comm: syz-executor5 Tainted: G B 5.0.0-rc4-next-20190130 #22 [ 259.136869][ T9988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.146939][ T9988] Call Trace: [ 259.150240][ T9988] dump_stack+0x1db/0x2d0 [ 259.152977][ T3866] kobject: 'loop2' (000000006ec0d0ed): kobject_uevent_env [ 259.154587][ T9988] ? dump_stack_print_info.cold+0x20/0x20 [ 259.167406][ T9988] panic+0x2cb/0x65c [ 259.168575][ T3866] kobject: 'loop2' (000000006ec0d0ed): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 259.171306][ T9988] ? add_taint.cold+0x16/0x16 [ 259.171325][ T9988] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 259.171340][ T9988] ? preempt_schedule+0x4b/0x60 [ 259.171357][ T9988] ? ___preempt_schedule+0x16/0x18 [ 259.171383][ T9988] ? trace_hardirqs_on+0xb4/0x310 [ 259.206758][ T9988] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 259.212403][ T9988] end_report+0x47/0x4f [ 259.214452][ T3866] kobject: 'loop3' (00000000bf9ca316): kobject_uevent_env [ 259.216569][ T9988] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 259.216587][ T9988] kasan_report.cold+0xe/0x40 [ 259.216603][ T9988] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 259.216622][ T9988] check_memory_region+0x123/0x190 [ 259.244733][ T9988] kasan_check_read+0x11/0x20 [ 259.249416][ T9988] reclaim_high.constprop.0+0xa6/0x1e0 [ 259.254843][ T3866] kobject: 'loop3' (00000000bf9ca316): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 259.254902][ T9988] ? lockdep_hardirqs_on+0x418/0x5d0 [ 259.270320][ T9988] ? memcg_oom_wake_function+0x6b0/0x6b0 [ 259.275965][ T9988] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 259.281429][ T9988] ? syscall_return_slowpath+0x519/0x5f0 [ 259.287084][ T9988] ? trace_hardirqs_off_caller+0x300/0x300 [ 259.292920][ T9988] ? lockdep_hardirqs_on+0x418/0x5d0 [ 259.298215][ T9988] ? retint_kernel+0x2d/0x2d [ 259.302830][ T9988] mem_cgroup_handle_over_high+0xc1/0x180 [ 259.308570][ T9988] exit_to_usermode_loop+0x299/0x3b0 [ 259.313877][ T9988] ? ret_from_fork+0x15/0x50 [ 259.318496][ T9988] ? syscall_trace_enter+0x12a0/0x12a0 [ 259.323954][ T9988] ? _raw_spin_unlock_irq+0x28/0x90 [ 259.329157][ T9988] ? lockdep_hardirqs_on+0x418/0x5d0 [ 259.334470][ T9988] syscall_return_slowpath+0x519/0x5f0 [ 259.339945][ T9988] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 259.340280][ T3866] kobject: 'loop3' (00000000bf9ca316): kobject_uevent_env [ 259.345674][ T9988] ? _raw_spin_unlock_irq+0x5e/0x90 [ 259.345692][ T9988] ret_from_fork+0x15/0x50 [ 259.345704][ T9988] RIP: 0033:0x45665a [ 259.345738][ T9988] Code: Bad RIP value. [ 259.367585][ T3866] kobject: 'loop3' (00000000bf9ca316): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 259.370363][ T9988] RSP: 002b:00007fff0c940ac0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 259.370378][ T9988] RAX: 0000000000000000 RBX: 00007fff0c940ac0 RCX: 000000000045665a [ 259.370387][ T9988] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 259.370396][ T9988] RBP: 00007fff0c940b00 R08: 0000000000000001 R09: 00000000016e9940 [ 259.370405][ T9988] R10: 00000000016e9c10 R11: 0000000000000246 R12: 0000000000000001 [ 259.370413][ T9988] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 259.381576][ T9988] Kernel Offset: disabled [ 259.433969][ T9988] Rebooting in 86400 seconds..