00000040)={0x0, r1}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) 18:09:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xaa, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xffffffff00000000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xad, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x109, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) lseek(r0, 0x0, 0x3) [ 716.316373][ T25] audit: type=1800 audit(1555438153.368:113): pid=1165 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16641 res=0 18:09:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000000)=0xfff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000100)=0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0x0]) write$FUSE_ENTRY(r1, &(0x7f0000000300)={0x90, 0xffffffffffffffda, 0x1, {0x2, 0x2, 0x9d3d, 0x266, 0x9, 0x8, {0x4, 0x9, 0xfffffffffffff446, 0x9, 0xfff, 0x9, 0x33e4, 0x8, 0x1, 0x3, 0x2, r2, r3, 0xff, 0xffffffff}}}, 0x90) lseek(r0, 0x0, 0x3) 18:09:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) lseek(r0, 0x0, 0x3) 18:09:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xab, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000100)=0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xae, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) lseek(r0, 0x0, 0x3) 18:09:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 716.745803][ T25] audit: type=1800 audit(1555438153.798:114): pid=1417 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16882 res=0 18:09:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f0000000000)=0x1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xaf, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x2, 0x0, 0x9) fallocate(r0, 0x0, 0xfff, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x0, 0x6, 0x0, 0x800000}) lseek(r0, 0x0, 0x3) 18:09:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)) lseek(r0, 0x0, 0x3) 18:09:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xac, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)) lseek(r0, 0x0, 0x3) 18:09:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 717.033622][ T25] audit: type=1800 audit(1555438154.078:115): pid=1662 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17089 res=0 18:09:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000001c0)={0x0, 0x50, 0x1000}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x6}) lseek(r0, 0x0, 0x3) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x412080, 0x0) 18:09:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)) lseek(r0, 0x0, 0x3) 18:09:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000240)=0x4) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0xc058534b, &(0x7f0000000180)={0x9, 0x1, 0x235, 0x4, 0x6, 0x81}) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000040)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x8000, {0x8, 0x83e, 0x8, 0x104, 0x20000001, 0xfff}, 0xfffffffffffffffa}, 0xe) write$rfkill(r3, &(0x7f0000000100)={0x4, 0x8, 0x2}, 0x8) 18:09:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xad, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x1) 18:09:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(0xffffffffffffffff, 0x0, 0x3) 18:09:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x80001) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) [ 717.464269][ T25] audit: type=1800 audit(1555438154.508:116): pid=1901 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16545 res=0 18:09:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xae, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000000)={{0x5, 0x7fff}, 0x10}, 0x10) 18:09:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xcbb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(0xffffffffffffffff, 0x0, 0x3) 18:09:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:14 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400202, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000040)={0x5, {0x5, 0x74, 0x10001, 0x411784f9}, {0x8f, 0x200, 0x439900000000, 0x1}, {0x862, 0x5}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioperm(0x8, 0xfffffffffffffb2c, 0x200) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r4 = shmget(0x2, 0x4000, 0x500, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(r4, 0xb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:14 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0xb53, 0x14, 0x1, r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x401, 0x9) fallocate(r2, 0x0, 0x0, 0x10ffff) pwrite64(r2, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3}) fcntl$getown(r2, 0x9) lseek(r2, 0x0, 0x3) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f0000000380)={0x9, 0x6c, 0x400, 0x36, &(0x7f0000000200)=""/54, 0x34, &(0x7f0000000240)=""/52, 0xe9, &(0x7f0000000280)=""/233}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000001400)={0x20, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0e630c4000000000220000076304400020000004e30440000000000000000000"], 0x1000, 0x0, &(0x7f0000000400)="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"}) 18:09:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xaf, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:15 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x9) fallocate(r1, 0x0, 0x0, 0x10ffff) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="58020000", @ANYRES16=r3, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000040) pwrite64(r1, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000500)={0x0, 0x1, [0x8, 0xfff, 0x200, 0x5, 0x0, 0x3, 0x101, 0xfffffffffffffffb]}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x400000020007f, 0x0, 0x0, 0xfffffffffffffffe}) io_setup(0x10001, &(0x7f0000000540)) lseek(r1, 0x0, 0x3) 18:09:15 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x10000, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000200)=0x401) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0xfffffffffffffffd, 0x400, 0x2, 0x0, 0x0, r2}) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r4, 0x7709, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) 18:09:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x110, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(0xffffffffffffffff, 0x0, 0x3) 18:09:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000180)="e48cb3245c513b08d0d1126c40e7b6a83849b85da4cd5e7241e8544e626b8067c348105a20b225ea5b686f1e761738596cd3f510c3b34e86c8fb8f360aab24b99ff1d3aad9701a442500011898ae99c24811108702639f91fe2da5f3a5a9908cf11b06a281", 0x65, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x0, 0x0, 0x1}) lseek(r0, 0x0, 0x3) 18:09:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x111, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xc0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000000)) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x3}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e22, 0x7fff, @dev={0xfe, 0x80, [], 0x21}, 0x3f}}, 0x55d6, 0x80}, 0x90) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x4, 0xc8000) 18:09:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x0) 18:09:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x20000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) ioperm(0x0, 0x5, 0x0) clone(0x4080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0, 0xfffffffffffffca4}], 0x1, r1) open(&(0x7f0000000000)='./file0\x00', 0x800, 0x0) 18:09:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) fallocate(r1, 0x0, 0x0, 0x9) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x4000, 0x0) fallocate(r0, 0x0, 0x0, 0x10ffff) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)={0x0}) read(r2, &(0x7f0000000200)=""/99, 0x63) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f00000001c0)={r3}) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x112, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x8}) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x0) 18:09:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x113, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:16 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x9) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10ffff) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0}) lseek(0xffffffffffffffff, 0x0, 0x3) 18:09:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40000, 0x0) write$capi20(r0, &(0x7f0000000040)={0x10, 0x2, 0x8f, 0x83, 0x0, 0x7}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0xffbffffffffffffd, 0xfffffffffffffffc) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x4000, 0x0) write$P9_RXATTRWALK(r4, &(0x7f00000002c0)={0xf, 0x1f, 0x2, 0x9b6}, 0xf) write$UHID_CREATE2(r3, &(0x7f0000000180)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x2, 0x800, 0x100000000, 0x6, 0xffff, 0x4, 'i+'}, 0x11a) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0x0, 0x3}, 0x10) lseek(r0, 0x0, 0x3) 18:09:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x0) 18:09:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x114, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:16 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3ff, 0x1) accept$ax25(r0, &(0x7f0000000180)={{}, [@remote, @default, @rose, @null, @null, @null, @remote, @default]}, &(0x7f0000000040)=0x48) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 719.439667][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 719.439685][ T25] audit: type=1800 audit(1555438156.478:118): pid=3440 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16609 res=0 18:09:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r0, 0x8, 0x40, 0x100000000009) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 18:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'sit0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\xfe\x00\x00\x00\x00,\xc0\xfe\a\x00', 0x141}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) 18:09:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x115, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x200, 0x40000) umount2(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000a4b758f100140b080f28bd7000fddbdf250f000006280035001f75b84572112c6c9a05f74e87c6f94ac31bb06a7bfefc10b35cff7ed7a2c23461000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4000011}, 0x40440c0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xffffff9c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000240)={0xfffffffffffff800, 0x10000, 0x8008, 0x7fff, 0x5, 0x0, 0xffffffffffffffbd, 0x7, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000002c0)={0xffffffffffffff75, 0x2, 0xfffffffffffff699, 0x80, r4}, 0x10) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 719.746297][ T25] audit: type=1800 audit(1555438156.798:119): pid=3571 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16673 res=0 18:09:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x1, 0x1000}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000000)=0x1) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x116, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0xfff, 0x900) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="500100812d654dd90900", @ANYRES16=r3, @ANYBLOB="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"], 0x150}}, 0x80) r4 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r4) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000001c0)=0x2) 18:09:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x117, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 720.125655][ T25] audit: type=1800 audit(1555438157.178:120): pid=3919 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17073 res=0 [ 720.299217][ T3800] device sit0 entered promiscuous mode [ 720.714512][ T3770] device sit0 left promiscuous mode [ 720.795799][ T3800] device sit0 entered promiscuous mode 18:09:17 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) syz_open_dev$dri(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') creat(&(0x7f00000003c0)='./file0\x00', 0x0) r2 = fcntl$getown(r1, 0x9) sched_setaffinity(r2, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x1}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r4, &(0x7f0000000140)=""/163, 0x100000345, 0x0, 0x0, 0x0) sendto$unix(r4, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r4, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) sendmsg$IPVS_CMD_SET_SERVICE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="d1eaca493264a025dfd5089101a4bef5792e4b459dc93d1ff7138adb027be8fa8b189703caa8cd444e49"], 0x1}}, 0x0) 18:09:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xba, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000240)=@nat={'nat\x00', 0x1b, 0x5, 0x448, 0xc0, 0x290, 0x0, 0x290, 0x0, 0x3b0, 0x3b0, 0x3b0, 0x3b0, 0x3b0, 0x5, &(0x7f00000001c0), {[{{@uncond, 0x0, 0x98, 0xc0}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@ip={@loopback, @local, 0xffffffff, 0xffffffff, 'team0\x00', 'nr0\x00', {}, {0xff}, 0xea, 0x2, 0x1}, 0x0, 0xb8, 0xf0, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @broadcast, @loopback, @gre_key=0x7f, @port=0x4e21}}}}, {{@ip={@loopback, @dev={0xac, 0x14, 0x14, 0x26}, 0xffffffff, 0xff, 'veth1_to_hsr\x00', 'teql0\x00', {}, {0xff}, 0x6c, 0x3, 0x38}, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv4=@multicast2, @icmp_id=0x68, @icmp_id=0x64}}}, {{@ip={@local, @remote, 0xffffffff, 0xffffffff, 'team0\x00', 'rose0\x00', {0xff}, {0xff}, 0x6f, 0x1}, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x1, 0x7}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x1, @loopback, @multicast1, @port=0x4e23, @gre_key=0x5}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4a8) 18:09:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x118, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r4 = getpid() timer_create(0x7, &(0x7f0000000040)={0x0, 0x2, 0x5, @tid=r4}, &(0x7f0000000100)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x200) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = shmget(0x3, 0x4000, 0x1000, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0xb) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r2}) lseek(r0, 0x0, 0x3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x80000001) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000100)=0x40) 18:09:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x119, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xbb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 721.194008][ T25] audit: type=1800 audit(1555438158.248:121): pid=4467 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16531 res=0 18:09:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x0, 0x2, 0x8}) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x20) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000200)=""/4096) 18:09:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0x101}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) r1 = syz_open_procfs(r0, &(0x7f0000000600)='io\x00') r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x2286, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="08000000489f0dac780d7fa99641898a41d818839b733f1f1b57022cccb58a751a9137732d789b605e2ee8d2c43dc9b8c51a9416ab1177b08386fbc68ad85feebcb74e892e21b22a069158a2a2318fc31e0d0f70", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x24) r3 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r4, 0x5386, &(0x7f0000000040)) ioctl$TIOCSIG(r1, 0x40045436, 0x1f) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) getdents64(r1, &(0x7f00000001c0)=""/114, 0x72) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r5 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000180)) r6 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440)=[{0x0}], 0x1, r5) creat(&(0x7f0000000480)='./file0\x00', 0x1a0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r6, 0x800443d3, 0x0) ioctl$TIOCSSERIAL(r6, 0x541f, &(0x7f00000003c0)={0x670, 0x1, 0x60b9, 0xfffffffffffffffc, 0xac, 0x100, 0xd4f7, 0x3d, 0x0, 0x1ff, 0x8, 0x2, 0x5, 0x43, &(0x7f00000002c0)=""/209, 0x7, 0x8, 0x8000000}) 18:09:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xb9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xbc, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000001c0)=""/73) 18:09:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 721.985124][ T25] audit: type=1800 audit(1555438159.038:122): pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17235 res=0 18:09:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xbd, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:19 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x620000, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000100)={0x8, 0x6}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={r2, 0x0, 0xfffffffffffffff8}, 0x8) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x3) fallocate(r3, 0x0, 0x0, 0x9) fallocate(r1, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r3}) lseek(r1, 0x0, 0x3) 18:09:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xba, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x401, 0x40) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100)={0x2}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x9, 0x6dc, 0x1, 0x10001, 0x0, 0x3, 0x20030, 0x1, 0x1, 0xfffffffffffffff8, 0x2, 0xfffffffffffffffb, 0xfff, 0x1, 0xdc38, 0x6, 0x7f, 0xea45, 0x0, 0x3, 0x2, 0x12cf, 0x80000000, 0x8, 0x401, 0x6, 0x8, 0x9, 0x2, 0x7, 0x8001, 0xffffffff, 0x6, 0x9, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x10040, 0x981, 0x7, 0x0, 0x7, 0x1283, 0x414}, 0xffffffffffffffff, 0xf, r0, 0x2) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x2000000, 0x3ff, 0x2}) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000240)={0xa, 0x5, {0x52, 0xffffffff, 0x7, {0xffffffff, 0x8}, {0x9, 0x3}, @period={0x5d, 0x3, 0x9, 0xfffffffffffffbff, 0x1000, {0xffff, 0x9, 0x5, 0x7fff}, 0x3, &(0x7f0000000200)=[0xffff, 0x9, 0x100000001]}}, {0x0, 0x2, 0x200, {0x0, 0x80000001}, {0x249, 0xfa68}, @const={0x379d06ba, {0x1, 0x6, 0x80, 0x566}}}}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) 18:09:19 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='pids.current\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x9) fallocate(r1, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000180)='?', 0x1, 0x40000000000000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000080)={{0x6, 0xe6e}, {0x91, 0x7ff}, 0x8, 0x0, 0x4}) lseek(r1, 0x11, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) lseek(r1, 0x0, 0x3) 18:09:19 executing program 3: fdatasync(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xc6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) read(r2, &(0x7f0000000040)=""/121, 0x79) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 18:09:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xbe, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xbb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r2, 0x1, 0x8}, 0xc) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0xd407a7c34a7e1b8) 18:09:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x5) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) [ 722.908350][ T25] audit: type=1400 audit(1555438159.958:123): avc: denied { name_bind } for pid=5154 comm="syz-executor.3" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:09:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xbf, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) [ 723.016245][ T25] audit: type=1400 audit(1555438159.978:124): avc: denied { node_bind } for pid=5154 comm="syz-executor.3" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 18:09:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, r0, 0x0, 0x48, &(0x7f0000000280)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00', 0xffffffffffffffff}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r0, 0x18, 0x9, 0xffff) fallocate(r0, 0x0, 0x0, 0x10ffff) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000003c0)=0x3f, 0x4) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xff, 0x1) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r2}) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x800, 0x8000) r3 = getpgrp(0x0) syz_open_procfs(r3, &(0x7f0000000200)='uid_map\x00') lseek(r0, 0x0, 0x3) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x1, 0x0, 0x200, 0x3, 0x5, 0x0, 0x7ff, 0x1ff, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=r4, @ANYBLOB="00000100ff7fc7f4e5ef12dc06cc0e59af0000000000008fa8173651d8b6b2a02db29baa4dd98d4a8d2535448b2f48a797810b4c27f9bcd6efe6a1eb5aecae9cb30c239f25c4d378f4e53e88d3c343efdbf37cff9c"], 0xa) 18:09:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xbc, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 723.154276][ T25] audit: type=1800 audit(1555438160.058:125): pid=5215 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16721 res=0 [ 723.299825][ T5155] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(185922129813607) <= P.seqno(0) <= S.SWH(185922129813681)) and (P.ackno exists or LAWL(14954040044440) <= P.ackno(14954040044442) <= S.AWH(14954040044442), sending SYNC... 18:09:20 executing program 2: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6ba, 0x408080) syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x80000000, 0x10b000) openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x100, 0x0) syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x80, 0x2) r0 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0xff, 0x1a000) r1 = openat$cgroup_ro(r0, &(0x7f0000000340)='cpuseffe_iems\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x9) fallocate(r1, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$int_in(r2, 0x0, &(0x7f0000000080)=0x6) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) lseek(r1, 0x0, 0x3) 18:09:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000000100)={0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}]}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) write$eventfd(r2, &(0x7f0000000180)=0x81, 0x8) 18:09:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xbd, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:20 executing program 3: fdatasync(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xc6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) read(r2, &(0x7f0000000040)=""/121, 0x79) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 18:09:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:20 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10ffff) pwrite64(0xffffffffffffffff, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0}) write$UHID_CREATE(r0, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/13, 0xd, 0x2, 0x5, 0x68badbac, 0x7f, 0x7}, 0x120) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000001c0)="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") lseek(0xffffffffffffffff, 0x0, 0x3) 18:09:20 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)={0x7f, 0x7fffffff, 0x4, 0x9, 0x5}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = getuid() fsetxattr$security_capability(r1, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0xc09, 0x10001}, {0x8, 0x7fffffff}], r2}, 0x18, 0x1) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f0000000100)={0x0, 0x40}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r4 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r4) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, 0x0) 18:09:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r1, 0x0, 0x0, 0x110003) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$CAPI_INSTALLED(r0, 0x80024322) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xbe, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) 18:09:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x2) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000100), 0x5) lseek(r0, 0x0, 0x3) 18:09:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x120, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:21 executing program 3: fdatasync(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xc6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) read(r2, &(0x7f0000000040)=""/121, 0x79) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 18:09:21 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:21 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000100)={{0x4, @addr=0x1}, 0x8, 0x4, 0x4}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x9) fallocate(r1, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0xfffffffffffffffb}) lseek(r1, 0x0, 0x3) 18:09:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xbf, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x121, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x8, &(0x7f0000000040)='keyring\x00'}, 0x30) ptrace$getenv(0x4201, r2, 0x9, &(0x7f0000000140)) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x400400) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) 18:09:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x122, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 724.625017][ T25] audit: type=1800 audit(1555438161.678:126): pid=6202 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17235 res=0 18:09:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) r3 = shmget(0x0, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000100)) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)=0x100000001) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r1, 0x0, 0x3) [ 724.992578][ T25] audit: type=1800 audit(1555438162.038:127): pid=6591 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17225 res=0 18:09:22 executing program 3: fdatasync(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xc6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) read(r2, &(0x7f0000000040)=""/121, 0x79) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 18:09:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x123, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000040)=""/5) ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f0000000000)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x8, 0xcd88, 0xd) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000380)=ANY=[@ANYPTR, @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000070000000000000000e400"/28, @ANYRES32=r0, @ANYRESOCT=r0, @ANYBLOB="909510633b679afca3c347e975d28eed7f4ba8fadc0e7377cfb29253b7780b3e38b32d2a6b46aab30de37e4331c005d0af4eb8bd269337ee2525c976f7b9ab8cc1c1d78e60e229ba6d5ce619b11a6b743bf596b2bc0441f6623e08e0299cfd353afaef4291552094fcfdc6798ec282c6e262a6cdde4f78fd2211864ad933c0533acf", @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRESOCT=r0, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES16=r1, @ANYRESOCT=r0, @ANYRESDEC=r1], @ANYRES64=0x0, @ANYRES16=r1, @ANYRES16=r0, @ANYRESHEX, @ANYRESOCT=r0, @ANYRES64=r0, @ANYRES64=r1, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYPTR]], @ANYRES32=r1, @ANYBLOB="00000000ffff9c0000007866f8cc487377937ce148c5d44c35d9d56994accbb6ca227500000000"]) fallocate(r0, 0x3, 0x0, 0xffffffffffffff81) pwrite64(r0, &(0x7f0000000300)="018753f7b956d4cfc85f759408ca4c152509a1c4e992112061caca6cd44fc69808dbe8c9102a9ad22792a0ea13cb96bb48f900f267d77288adb95e0d96f93c11a870", 0x42, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r1, 0x0, 0x3) 18:09:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/connector\x00') writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="ec", 0x2a6}], 0x1) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000000)=0x800, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000300)=0x7f) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000001c0)) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x2}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0xffffffffffff8001}, &(0x7f0000000000)=0x218) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000280)={r2, 0x8000}, &(0x7f00000002c0)=0x8) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000200)) r3 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x3) lseek(r1, 0x0, 0x3) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000100)={{0x5, 0x6, 0x7f83, 0x350, 0x0, 0x3}, 0x40}) 18:09:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x124, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:22 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r2 = shmget$private(0x0, 0x1000, 0x8, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000180)={[0x0, 0x4c48], 0x0, 0x400, 0x3}) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) 18:09:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x125, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:23 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffff9, 0x100) r1 = openat$cgroup_ro(r0, &(0x7f0000000240)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x9) fallocate(r1, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) lseek(r1, 0x0, 0x3) 18:09:23 executing program 3: fdatasync(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xc6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) read(r2, &(0x7f0000000040)=""/121, 0x79) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 18:09:23 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = gettid() sendmsg$nl_netfilter(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x6002}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0x454, 0x1, 0xf, 0x0, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x6}, [@generic="ed5e6d75595cc0deffdb9b94603f21aab6b6a1f4064a30d0e921ac2111bb664242d9b5889501475565716652eca39d2f85336d8a63a45ff5d649f50b7da67a1e3172175ae18d948fe71766ba82944ceec212b919d91fae924ceb6aba6410e1f2d683945a49e53bee", @nested={0xec, 0x7, [@generic="1fad2b59e878b2a787c43a02322798df35e1550a9327b5fc626b887949e7f5e42afb9999908be4848915df16d9a9fd05b3dadb2db617308ce9a0d516976c3823f2b4c439829f48354a27e0b72480cf2ac256d054c5e1f9c59f097144b14306ecf49f606a2aaf4c7389fa2f3a4ca4f0a42f05a7c38030672de823e04445170b3cacfd306e3cc216557a6bfff5a9a02ca143a2dcd8860e414dbf61373d5025717e42953f83ef8753d532924fc92b13abc582c2238b2db823de8e60e32e129d2aba99c53634e2ad8a1c3493a3df2995fd22df9480898c", @typed={0x8, 0x63, @uid=r4}, @typed={0x8, 0x5a, @fd=r0}]}, @nested={0x298, 0x2f, [@typed={0x8, 0x91, @ipv4=@loopback}, @generic="521b5688af480bd0c3449a409e37ef0b0db503e4257a86843f0f131fc99f86e5bd611b5cc6e0d22e153556b8960a74d11ec1ba890697435344144850691beea464d5c86aed1654b7c14ab54fb0adac381bd9e948c5e0b605f25c1966495eb243d5f7872ef99e8ff0c74ba300b154c19595a66ded4932e9e4b97375947ad58bb7fed2de743410519fb82a3c5e4c6862561217cf3b3a5502c403dcb94b30a425bb26f3e102c3d76139e29108cda8bb6449f6d8", @typed={0x8, 0x6d, @ipv4=@empty}, @generic, @generic="7dcea031542fc52af554c8b923330df6b59e9ae324cfcc95e2db15c189907d05149f59b51cafc5b043a9127a8b7865dd99a989ec7d93bd4a4287a56211c2a264b86ca17d079f5883e3347427715099e5c0a6b92d0e3de21ab95018e71856217d2510e571b90a6d9ca6ca95b4158e48f8767af47b75721e1a7ff0bbc978fc4a54b31b046f4186d66c41bd4b75e464e36039f4769647fecc6969d27989b3dfd4d0fa0fcb9ed073ddbaeebf84efc3a89939ba2182c8922f1ad54bd5b9dfc82d6a939a5a48c976e80015465d1669916cf7f021c493396d92f1e7ee74633e048de2253dda260b", @generic="bec87bc3bd755568c213e880622d011085561a03fde208093a9b07d9db380a1ca25a7e32b93300565e2129cbd09f91f1dc7f70c0c8aecdd33a98f94177bbabde0ee2a13c4dfedab6ef84563498390c361885753c6244b68b11a21c6bac77aa4ce128d0e88891235fcc1e5132d7b1ea4ce39f18c718069be597089f3b3ab79bb5386ba3784076bffd4b7d7f6cb5378fb1824ee13464633c87fe7b18c7b84f9e0884ae269b3b2903002e5f2eda4f615302b8f4c5916b8997b7ffb6c2a3bfa118c21104a970b079beed8ad3de34462554b3edcd0d882376a866fa5416e8639ac144502c046b", @typed={0x8, 0x94, @u32=0x714c}]}, @nested={0x20, 0x61, [@typed={0x4, 0x92}, @typed={0x4, 0x17}, @typed={0x14, 0x72, @ipv6=@rand_addr="58be789db0a888500bc41dc48f18eef8"}]}, @nested={0x20, 0x7b, [@typed={0x8, 0x14, @ipv4=@local}, @typed={0x14, 0x89, @ipv6=@dev={0xfe, 0x80, [], 0x25}}]}, @nested={0xc, 0x62, [@typed={0x8, 0x77, @u32=0xffffffff}]}, @typed={0x8, 0x7a, @pid=r5}]}, 0x454}, 0x1, 0x0, 0x0, 0x40000}, 0x4000010) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f0000000000)) r6 = socket(0x5, 0x3, 0x9) fcntl$getownex(r6, 0x10, &(0x7f0000000180)) 18:09:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:23 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) write$vnet(r0, &(0x7f0000000380)={0x1, {&(0x7f0000000180)=""/229, 0xe5, &(0x7f0000000280)=""/236, 0x0, 0x7}}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) sched_yield() 18:09:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$int_in(r1, 0x5473, &(0x7f0000000000)=0x6) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x126, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x802, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) open_by_handle_at(r0, &(0x7f0000000180)={0xd3, 0x22c3, "0a744e0cf31431e1369485280b380af051c7f4c4320bed2f588a743cdb20ecd0cfca6e132638907c1dc0b50d2b1dc52fdec2b15e3e77368cec4737db7c149150e8480e0af844e325500001d0c8486bbeb2ca00b455315f22baf4a41d432a06668f2218f85394b2f83080b81e4e2a94771a3e0be792133951ce64dc86e349681f706e959b15c56a68c3a07668dbbd3d13b07def98ed111cf4dc1ad05d98860acdd85ecb3b9d76feb480f29ea1ba8517e0aaa64eb2bc9e1fda5c074804e6b991076e877d02153f3becc725db"}, 0x1c000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) 18:09:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x2, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) ioctl$RTC_PIE_OFF(r0, 0x7006) signalfd(r1, &(0x7f0000000000)={0x8}, 0x8) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)=0x7fffffff, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) [ 726.610977][ T25] audit: type=1800 audit(1555438163.658:128): pid=7255 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17272 res=0 18:09:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x127, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000000)={0xa, 0x20, 0xffff, 0x1}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:24 executing program 3: fdatasync(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xc6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) read(r2, &(0x7f0000000040)=""/121, 0x79) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 18:09:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x2}) lseek(r0, 0x0, 0x3) 18:09:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x128, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x42c102, 0x0) 18:09:24 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x100000000) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r2 = shmget(0x1, 0x4000, 0x78000000, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) 18:09:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="381d0000", @ANYRES16=r1, @ANYBLOB="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"], 0x138}, 0x1, 0x0, 0x0, 0x4080}, 0x20000000) fallocate(0xffffffffffffffff, 0x0, 0x4, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000000)={0x0, 0x9, 0x3f, 0x1}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)) lseek(r0, 0x0, 0x1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000001c0)=0xffffffffffffffe1, 0x4) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000280)={0xa, @sdr={0x79765f5f, 0x101}}) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x202000) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x5}) 18:09:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x129, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440), 0x0, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xca, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 727.566245][ T25] audit: type=1800 audit(1555438164.618:129): pid=7743 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17282 res=0 18:09:25 executing program 3: fdatasync(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xc6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) read(r2, &(0x7f0000000040)=""/121, 0x79) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 18:09:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x4) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, 0x0, &(0x7f0000000080)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xcb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x101000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000001c0)=""/137, &(0x7f0000000000)=0x89) lseek(r0, 0x0, 0x3) 18:09:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0xa30000, 0x100000001, 0xfffffffeffffffff, [], &(0x7f0000000040)={0x9909db, 0x7, [], @value=0x3}}) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 728.480188][ T25] audit: type=1800 audit(1555438165.528:130): pid=8240 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16533 res=0 18:09:26 executing program 3: fdatasync(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xc6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) read(r2, &(0x7f0000000040)=""/121, 0x79) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 18:09:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xcc, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)=0x0) sched_rr_get_interval(r3, &(0x7f0000000040)) 18:09:26 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x14c00) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x9) fallocate(r1, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) lseek(r1, 0x0, 0x3) 18:09:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xc9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, r2, 0x3c, 0x0, @ib={0x1b, 0x4, 0xc4, {"d93c8e7ec909009516c7d4b041a4b89f"}, 0x8, 0x1ff, 0x2}}}, 0xa0) r3 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r4 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r4) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x6) 18:09:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x3) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x1ff, 0x0, 0xf9, &(0x7f00000001c0)="982a158c3533a561e4301c2db41a9d62a1bdfdd21108f24be6c089bfcb7b0854203b2b50b111feadf46d2f4faf299aec1a9c8e2346611f04e473f162caff84a77221bc050bf7c96d91913f5495a7009f8becd0fa53d5bc641650dc54a8128e78e5c3349479f23bf31d8c7ec71eb345a2d05c89a39eb210dc58ef0647c2a739c8d18a2564997e70b775a52c79920c2b6c97c4d4ab3a2e3606009fa01e84bd5a0cdfa7aa09b43b198dab28ec90ee6c8f7593f81c164c47ac5bc3a6b850293da4e8f4e1312e6c541bfd5cc0d5acc7abf7a6c804adf438a8a16b872ff6cd680bf4ed21da1991a70149f1ddec602ef6c507fb006a5f4f929f2e8c92"}) lseek(r0, 0x0, 0x3) 18:09:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xca, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xcd, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000180)="9aa4e88f30d667b0b5ce87dc8abff3fd31d8e62e536a1c9af1c204b8cb3974dac9475b6989615af76d387f46990afd85f9d901ccd13ec142034099d5af6dd7297530cd0e4f57eb555bcf6843d84c9bbd928422eee9b9b4de587ff00135266f998261aa6338230dcbb29778d07872e6dcf7463eba8e597f5ad583372638d0cb4d424d3b13120571", 0x87, r1) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000240), 0x0, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) [ 729.498329][ T25] audit: type=1800 audit(1555438166.548:131): pid=8601 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17327 res=0 18:09:27 executing program 3: fdatasync(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xc6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) read(r2, &(0x7f0000000040)=""/121, 0x79) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 18:09:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xce, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:27 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x88000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='pids.current\x00', 0x275a, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e21, 0x80000001, @ipv4={[], [], @empty}, 0x4}, {0xa, 0x4e20, 0xfffffffffffffff7, @mcast1, 0x1}, 0x3, [0x5, 0x6, 0x8, 0x3, 0x6b, 0x401, 0x8b, 0x3]}, 0x5c) get_thread_area(&(0x7f0000000280)={0x80, 0x20000800, 0xffffffffffffffff, 0x8, 0x10001, 0x1ea, 0x0, 0x1, 0x0, 0x8000}) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'rdma'}, {0x2d, 'cpu'}, {0x2b, 'memory'}]}, 0x13) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x40003fffffffffe, 0x0, 0x9) fallocate(r1, 0x0, 0x0, 0x2) pwrite64(r1, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) lseek(r1, 0x0, 0x3) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x0, 0x1c9c380}}, &(0x7f0000000100)) 18:09:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xcb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x1, 0x100) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000180)=""/39) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d03, 0x1]}) ioctl$KVM_SET_MSRS(r7, 0xc008ae88, &(0x7f0000000140)=ANY=[@ANYBLOB="0100009fdcf2c30f4c0000000000a00d0000000000000002"]) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000000)={0x70, 0xffffffffffffff35}) 18:09:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x130, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xcc, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xcf, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000001c0)) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000280)=0xf4272) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000100)=0x4) lseek(r0, 0x0, 0x3) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f00000002c0)=0x80, 0x4) [ 730.270959][ T25] audit: type=1800 audit(1555438167.318:132): pid=9018 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17341 res=0 [ 730.529371][ T25] audit: type=1800 audit(1555438167.578:133): pid=9206 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17337 res=0 18:09:27 executing program 3: fdatasync(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xc6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) read(r2, &(0x7f0000000040)=""/121, 0x79) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 18:09:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x131, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xcd, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x6) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000000)=0xf59a) 18:09:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) write$P9_RSTAT(r1, &(0x7f00000001c0)={0x107, 0x7d, 0x1, {0x0, 0x100, 0x10000, 0x7, {0x2, 0x4, 0x4}, 0x4000000, 0x3d8, 0x39, 0x100000001, 0x3d, 'vboxnet0:trustedvboxnet1{[\'{trustedbdeveth1%&cpuset\x13{system$[', 0x48, 'stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00', 0x48, 'stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00'}}, 0x107) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x20000}) lseek(r0, 0x0, 0x3) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x9c, r2, 0xa10, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa89}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5d90d668}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfb}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000}, 0x10) 18:09:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200080, 0x0) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000040)=0x2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) [ 731.066143][ T25] audit: type=1800 audit(1555438168.108:134): pid=9275 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17356 res=0 18:09:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x132, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xce, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000000)={0x0, 0x8000}) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r3, 0x402, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0xc004) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) clock_gettime(0x2, &(0x7f0000000300)) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$security_ima(r4, 0x0, 0x0, 0x0, 0x2) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x1019b) ioctl$UFFDIO_COPY(r6, 0xc028aa03, &(0x7f00000002c0)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xf}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0xa00}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000280)=0x2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) [ 731.333816][ T25] audit: type=1800 audit(1555438168.388:135): pid=9495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17332 res=0 18:09:28 executing program 3: fdatasync(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xc6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) read(r2, &(0x7f0000000040)=""/121, 0x79) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 18:09:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x133, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xcf, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) request_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='/dev/loop#\x00', 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, r1) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:28 executing program 2: syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000340)={0x0, 0x6}, &(0x7f00000003c0)=0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2004110}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r2, 0x402, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x10001, @media='eth\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x4081) fallocate(r0, 0x0, 0x0, 0x10ffff) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000300)=0x7fffffff, 0x4) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) 18:09:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000480)={"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"}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) 18:09:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x134, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000000)={0x8, 0xff, [0x9, 0x7, 0x503, 0x8000, 0x8], 0x30c}) read$FUSE(r0, &(0x7f00000001c0), 0x1000) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x10000000007, 0x4000000000110001) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0xbe, 0x0) recvfrom$unix(r1, &(0x7f0000000180)=""/200, 0xc8, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) epoll_wait(r3, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:29 executing program 3: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, 0x0) 18:09:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x135, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)) lseek(r0, 0x0, 0x3) 18:09:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7fff, 0x200100) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000180)={0x5, 0x40, 0x0, 'queue1\x00', 0x7d9c}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x136, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:30 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x20}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r2, 0x1f}, 0x8) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) 18:09:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) fallocate(r1, 0x0, 0x0, 0xb) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000000)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x137, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$netlink(0x10, 0x3, 0xb) writev(r1, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'lo\x00@\x00', 0x101}) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000080)=0x200000000) getpeername$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) ioctl$int_in(r4, 0x40000000af01, &(0x7f0000000380)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl(r6, 0x800000000008982, &(0x7f0000000000)) preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(r5) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000180)={0x0, r5}) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 18:09:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x5, 0xfffffffffffffffe, 0x0, 0x4, 0x10001, 0x200, 0xd2c6, 0x1000000, 0x7, 0x4, 0x261, 0x67, 0x3, 0x3, &(0x7f0000000200)=""/250, 0xfff, 0x7}) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3, @default, @rose={'rose', 0x0}, 0x2, [@null, @bcast, @default, @default, @default, @bcast, @null, @null]}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000001c0)={'security\x00'}, &(0x7f0000000240)=0x54) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000100)=0x4) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 733.422970][ T25] audit: type=1400 audit(1555438170.468:136): avc: denied { create } for pid=10512 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 18:09:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 733.468531][T10591] device lo entered promiscuous mode [ 733.509352][T10618] Unknown ioctl 21535 18:09:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x138, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 733.541195][T10618] Unknown ioctl 35083 [ 733.546490][ T25] audit: type=1400 audit(1555438170.518:137): avc: denied { write } for pid=10512 comm="syz-executor.3" path="socket:[127515]" dev="sockfs" ino=127515 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 [ 733.563037][T10618] Unknown ioctl 21535 [ 733.583561][T10627] 8021q: VLANs not supported on lo [ 733.593533][T10626] Unknown ioctl 35083 18:09:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x184) fallocate(r0, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) [ 733.616557][ T25] audit: type=1800 audit(1555438170.648:138): pid=10619 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17353 res=0 18:09:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) getpeername$inet6(r2, &(0x7f0000000000), &(0x7f0000000040)=0x1c) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x139, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 733.809313][T10627] 8021q: VLANs not supported on lo 18:09:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x600, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000200)={0x40, 0x2, 0x2}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x400000000000030, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r4 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r4) ioctl$BINDER_SET_MAX_THREADS(r5, 0x40046205, 0x20b5fb64) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, 0x0) [ 733.910678][ T25] audit: type=1800 audit(1555438170.958:139): pid=10840 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17354 res=0 18:09:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$netlink(0x10, 0x3, 0xb) writev(r1, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'lo\x00@\x00', 0x101}) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000080)=0x200000000) getpeername$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) ioctl$int_in(r4, 0x40000000af01, &(0x7f0000000380)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl(r6, 0x800000000008982, &(0x7f0000000000)) preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(r5) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000180)={0x0, r5}) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 18:09:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) getsockname$packet(r0, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001500)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001540)={@mcast2, 0x21, r2}) 18:09:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:31 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40601) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x9) fallocate(r1, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) lseek(r1, 0x0, 0x3) 18:09:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000100)=0x4) lseek(r0, 0x0, 0x3) 18:09:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 734.425644][T11065] 8021q: VLANs not supported on lo 18:09:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x1000000000000, 0x301000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000180)={0xd0, 0x0, 0x5, [{0x2, 0x37, 0x8, 0x1f, 'keyring\x00'}, {0x6, 0x4, 0xa, 0x0, '/dev/full\x00'}, {0x2, 0x6, 0xb, 0x8, '/dev/loop#\x00'}, {0x2, 0x2, 0xa, 0x6, '/dev/full\x00'}, {0x3, 0x8, 0xa, 0xfffffffffffff801, '/dev/full\x00'}]}, 0xd0) r2 = dup2(r0, r0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x480200, 0x0) r4 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r4) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, 0x0) 18:09:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$netlink(0x10, 0x3, 0xb) writev(r1, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'lo\x00@\x00', 0x101}) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000080)=0x200000000) getpeername$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) ioctl$int_in(r4, 0x40000000af01, &(0x7f0000000380)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl(r6, 0x800000000008982, &(0x7f0000000000)) preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(r5) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000180)={0x0, r5}) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 18:09:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$UI_GET_SYSNAME(r3, 0x8040552c, &(0x7f0000000000)) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) 18:09:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$netlink(0x10, 0x3, 0xb) writev(r1, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'lo\x00@\x00', 0x101}) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000080)=0x200000000) getpeername$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) ioctl$int_in(r4, 0x40000000af01, &(0x7f0000000380)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl(r6, 0x800000000008982, &(0x7f0000000000)) preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(r5) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000180)={0x0, r5}) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 18:09:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xda, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$netlink(0x10, 0x3, 0xb) writev(r1, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'lo\x00@\x00', 0x101}) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000080)=0x200000000) getpeername$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) ioctl$int_in(r4, 0x40000000af01, &(0x7f0000000380)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl(r6, 0x800000000008982, &(0x7f0000000000)) preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(r5) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000180)={0x0, r5}) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 734.887031][T11526] 8021q: VLANs not supported on lo 18:09:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80000) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000100)=0xb) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) [ 734.924764][T11521] device lo entered promiscuous mode 18:09:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xdb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:32 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0xffffff86, 0x3}]}}, @icmp=@timestamp_reply}}}}, 0x0) 18:09:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xfffffffffffffd94) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x102, 0x0, {0x2, 0x5, 0x649f8547, 0xfffffffffffffc00}}) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000040)=0x24b6, 0x4) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) fdatasync(r0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) [ 735.223521][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 735.229364][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 735.233509][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 735.237336][T11672] 8021q: VLANs not supported on lo [ 735.240889][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 735.303493][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 735.309313][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:09:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xd9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:32 executing program 2: 18:09:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000000)={'caif0\x00', {0x2, 0x4e21, @local}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:32 executing program 3: 18:09:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xdc, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:32 executing program 2: 18:09:32 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ubi_ctrl\x00', 0x410000, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f00000005c0)={0x0, 0x1}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000006c0)={r1, 0x68, &(0x7f0000000640)=[@in6={0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x23}, 0x665f}, @in={0x2, 0x4e22, @rand_addr=0x3}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e22, 0x5, @rand_addr="cd834fece95062421481290d02290de5", 0x3}]}, &(0x7f0000000700)=0x10) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000240)=""/212) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200080}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x6c, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xdd}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x3ff}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xa81c}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000380)={{0x7, 0x8}, 'port0\x00', 0x40, 0x0, 0x1000, 0x9, 0x8, 0x5, 0x100, 0x0, 0x4, 0x2}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) 18:09:32 executing program 3: 18:09:32 executing program 2: 18:09:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x140, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 735.703510][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 735.709369][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xda, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xdd, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) recvfrom$x25(r2, &(0x7f0000000980)=""/4096, 0x1000, 0x40000000, 0x0, 0x0) 18:09:32 executing program 3: 18:09:32 executing program 2: 18:09:33 executing program 3: 18:09:33 executing program 2: 18:09:33 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x220000, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000180)=""/221) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) 18:09:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x141, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:33 executing program 3: 18:09:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xdb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xde, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:33 executing program 2: 18:09:33 executing program 3: 18:09:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) openat$tun(0xffffffffffffff9c, &(0x7f0000000680)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, 0x0) 18:09:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_MSCBIT(r0, 0x40045566, 0x0) 18:09:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x142, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xdc, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 736.475420][T12569] input: syz1 as /devices/virtual/input/input7 18:09:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0, 0xfffffffffffffe8e}], 0xd8, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000180)="c17c67dbd272ff4213daa0b5d0764f7be4985513bfdf70e94f1bb9f61d9cc6ec4d33471d8db469e4d491b6a778c1a703423b6af1d015d2b26f1f7d3e0e1ac10f681a2b73d7a40751bcb56d186b7d2421781a6342f2c52f6f7a7f59d861f8befe59413822a6740107a7da8f6e5f6519ea70d1fd91d7507ed09f619797f72617afbe5987e204445300ed0f975c2c1540e23cca0c40d9346170ea276edbb93c31863f371fcf01e548cd0872d542cf77a12adfad3255a82b5d7429fe4a4248e1d9c830df7827d5e0e86e9a8f245569bf7ddcca937cf1f78d84e52e4f196235595fa902102325b0012ef18e880fc57cca417ca1d4", 0xf2}, {&(0x7f0000000980)="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", 0x1000}], 0x2, 0x1) [ 736.586244][T12569] input: syz1 as /devices/virtual/input/input8 18:09:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xdf, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x143, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:33 executing program 2: syz_genetlink_get_family_id$nbd(0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x81, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000000)) write$UHID_CREATE2(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{}]}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 18:09:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x3, 0x4a2200) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000180)={0x1, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}}, {{0x2, 0x4e20, @multicast2}}}, 0x108) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) [ 736.825978][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 736.831822][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xdd, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) write$vhci(r2, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, "08606965c73df9f19b591509c9ba38c56dfd38203d6a7accad2f6505ddd9e3be6bd4e91accb3fd6689b826f607d36ee92585664d03be7f037be3e02dd17315d1696f66b1118118479d2cb26306a7301075b3802fd985dcd8ab4c615f5f4d46f28cfdacf4ee7ad6f3fbdf0951b4391286e8d8fa905e2978c2c0b6bd84211ba3171cdb1b84ff2bc601bd696a0566d33dc940859ecc7b58186b3e387a5990a06bfab2f0f86ef5b9603a2fdda00cb3ca2ded500054891d32636f42158f8398060ed13e118578583434e31221652da5aaa8a2534665"}, 0xd4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x144, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:34 executing program 3: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0xe) 18:09:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x145, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xde, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000180)={0x0, @bt={0x6, 0xfffffffffffffffe, 0x0, 0x1, 0x80000001, 0x2d, 0x2, 0x6, 0x37, 0x2, 0x80, 0x6, 0x10001, 0x7f, 0x1, 0x2}}) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:34 executing program 2: syz_genetlink_get_family_id$nbd(0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x81, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000000)) write$UHID_CREATE2(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{}]}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 18:09:34 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000000)) r2 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x7, 0x8000) getsockopt$inet_dccp_buf(r2, 0x21, 0xd, &(0x7f00000001c0)=""/91, &(0x7f0000000240)=0x5b) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) rseq(&(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6, 0x0, 0x5, 0x4}, 0x1}, 0x20, 0x1, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) keyctl$search(0xa, r3, &(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, r3) ioctl$BLKGETSIZE64(r4, 0x80081272, &(0x7f0000000300)) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) msgget(0x0, 0x240) 18:09:34 executing program 3: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 18:09:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x146, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xdf, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:34 executing program 2: syz_genetlink_get_family_id$nbd(0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x81, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000000)) write$UHID_CREATE2(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{}]}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 18:09:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x147, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x142, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x148, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xec12785e69cdb487) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) keyctl$negate(0xd, r1, 0x78, r1) 18:09:35 executing program 2: syz_genetlink_get_family_id$nbd(0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x81, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000000)) write$UHID_CREATE2(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{}]}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 18:09:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) 18:09:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x149, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:35 executing program 5: r0 = open(&(0x7f0000000240)='./file0\x00', 0x20000, 0x84) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000280)=0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x82000, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000180)={0xa, 0x4, [{0x1, 0x0, 0x63e1}, {0x3, 0x0, 0x6}, {0x1, 0x0, 0x7}, {0x20, 0x0, 0xcda1}, {0x1, 0x0, 0x100000001}, {0x89b, 0x0, 0x3ff}, {0x81, 0x0, 0x1f}, {0x5, 0x0, 0xa8}, {0x4}, {0x2, 0x0, 0x8}]}) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f00000002c0)=0x1, 0x4) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000040)={0x23, "72c5b2d52447d404bedd107cde1cddd44a7f939f240fa91ad9796405134de656205518"}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) 18:09:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x138, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 738.722594][T13856] QAT: Invalid ioctl 18:09:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 738.765168][T13856] QAT: Invalid ioctl [ 738.777247][T13915] QAT: Invalid ioctl [ 738.781686][T13915] QAT: Invalid ioctl 18:09:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000), 0x80800) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000005480)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000180)={0x3, "074fea0d8741c23f370543321baab073b1d4efff811feb8b2679a10dcb02b2ed", 0x0, 0x41f, 0x1, 0x10, 0x3}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000440), 0x0, r2) recvmmsg(r3, &(0x7f00000052c0)=[{{&(0x7f0000000200)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000980)=""/4096, 0x1000}], 0x1, &(0x7f0000000280)=""/99, 0x63}, 0x7f}, {{&(0x7f0000000300)=@ipx, 0x80, &(0x7f0000000380)=[{&(0x7f0000000480)=""/227, 0xe3}], 0x1, &(0x7f0000000580)=""/187, 0xbb}, 0x5}, {{&(0x7f00000003c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000640)=""/131, 0x83}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000000700)=""/16, 0x10}, {&(0x7f0000000740)=""/130, 0x82}], 0x4, &(0x7f0000002980)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000000840)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000003980)=""/165, 0xa5}], 0x1, &(0x7f0000000900)=""/21, 0x15}, 0x9}, {{&(0x7f0000003a40)=@ax25={{0x3, @netrom}, [@null, @rose, @default, @default, @rose, @rose, @bcast]}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003ac0)=""/28, 0x1c}, {&(0x7f0000003b00)=""/14, 0xe}, {&(0x7f0000003b40)=""/238, 0xee}, {&(0x7f0000003c40)=""/70, 0x46}, {&(0x7f0000003cc0)=""/33, 0x21}, {&(0x7f0000003d00)=""/43, 0x2b}, {&(0x7f0000003d40)=""/103, 0x67}, {&(0x7f0000003dc0)=""/68, 0x44}, {&(0x7f0000003e40)=""/106, 0x6a}, {&(0x7f0000003ec0)=""/44, 0x2c}], 0xa, &(0x7f0000003fc0)=""/147, 0x93}, 0x3f}, {{0x0, 0x0, &(0x7f0000005240)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/189, 0xbd}, {&(0x7f0000005140)=""/242, 0xf2}], 0x3, &(0x7f0000005280)=""/43, 0x2b}, 0x1000}], 0x6, 0x120, &(0x7f0000005440)={0x0, 0x989680}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x136, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) 18:09:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) 18:09:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) 18:09:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40000, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) r2 = getpgrp(0xffffffffffffffff) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000180)={0x1, 0x4}) setpgid(r1, r2) r3 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000100)) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r4 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r4) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, 0x0) 18:09:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) [ 739.600487][T14377] Unknown ioctl 35076 18:09:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/198, &(0x7f0000000000)=""/69, &(0x7f0000000280)=""/69, 0x3004}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 18:09:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 18:09:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) 18:09:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e22, 0x7, @local, 0x2}, {0xa, 0x4e23, 0xe4, @remote, 0xa50f}, 0x912, [0xfffffffffffff9a5, 0xfff, 0x8, 0x10000, 0x2, 0x1, 0x0, 0x8001]}, 0x5c) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) 18:09:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) request_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='/dev/loop#\x00', 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, r1) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xffffffffffffffef) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e22, 0x7, @local, 0x2}, {0xa, 0x4e23, 0xe4, @remote, 0xa50f}, 0x912, [0xfffffffffffff9a5, 0xfff, 0x8, 0x10000, 0x2, 0x1, 0x0, 0x8001]}, 0x5c) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x150, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x100000000) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000440), 0x0, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) 18:09:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:09:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xffffffffffffffef) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:09:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="a30000007d3c5eb961b373b0d80d8589538399134cd1674909a89883cc56460d4d83f27b7ba49af5a183a0eb983f00da30920e4830b407da8a58cb4958097b57a649b7a599941b000083091f105d1221a2cfd703877acfcc306eedf86e84f8cffb8578234f89a59a224839e4ec57e6647c5b54886c64af3e1b1f1fcae6a352d04f26806d2ad81ba2ef47e1ad73d90f6ba7e039d17ae82d6d9862f2f481bda9df8e63745aad5fd9"], &(0x7f0000000100)=0xab) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={r2, 0x6, 0x6, 0x2, 0x4, 0x1}, 0x14) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) ioctl$SIOCAX25ADDFWD(r4, 0x89ea, &(0x7f0000000000)={@null, @null}) 18:09:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x151, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xffffffffffffffef) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:09:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xea, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) [ 740.983570][ C1] net_ratelimit: 18 callbacks suppressed [ 740.983578][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 740.995194][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xffffffffffffffef) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xe9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x152, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0x40, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f00000004c0)={{0x5258, 0x1, 0x3, 0x1f, 0x3, 0x54}, 0x5}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x8004, 0x5}) r2 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x81, 0x4004) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000380), 0x3, {0xa, 0x4e20, 0x5, @rand_addr="707e55126ef2c78b0e960f1dac586a95", 0x1}, r3}}, 0x38) r4 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, 0xfffffffffffffffe, 0x30d) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000500)) r5 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="68677d58a3afb2cee17a7e8abb70952f77ddecc6dd34af09e25cadb5665d6dc8900020c84a6a3a75ab8133390f4e3be126fc98a74ba15ea1784b8dd9cff520aa2a2f8117f372fac5c99d40c19a2e9a4d2d991204553247054f08e08c9bfdaeefaab87e", 0x63}, {&(0x7f0000000180)="05a339d4c31cf6f30ed6fca90f29283c3e47b8276ded73304a61460346f281e4b1547aefc15e22957625545e2f1cb20fe15274fe284869f5d3523750928dc399668663dbf2a734503bb2146dff9cfd50f537f275005c49c4eff4946c37fe1063f2ccb066370cd2ceab8b182e3b133cfb03292889821c19c98586e55fbdd09f6e75af33dfd3f686d3291f77bd48a161089672d1e9394a5c406aaea759b19930f6cb0f93100bb23a51fa593feac4d417882e70271fce8053ea64fb4b4e36c5f55718267dccebb9b058db657292654ea3457be92cc64a138894f2dcfba6894a3932b0aff3158e557c4c327e638ce2f5c8cc7f804e1c20", 0xf5}, {&(0x7f0000000100)}, {&(0x7f0000000280)="3741aa8821898e139d8cd30816a248e44c3c1fd576cba37d6966d16527a816b08602da728045ba9e5e7024930cc4662be58650129141c3751cbf9962a90f46f285cd1c152193da216f84a06bb97f79ec5998cc71aff14debe0364730a1b5eaf02f8c1e66e3f34707419b80c9739c0b9684b419ac843d0138574771dd4cb7d8f9b1912d07beb9ac08b7ecf776c6295e731da93405c45d9e", 0x97}], 0x4, r4) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, 0x0) 18:09:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xeb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xffffffffffffffef) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) 18:09:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xea, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x153, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 741.463495][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 741.463511][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 741.469432][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 741.475187][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 741.543500][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 741.549359][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:09:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xeb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xec, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x154, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xec, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xed, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x155, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 741.944305][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 741.950140][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xffffffffffffffef) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) 18:09:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x156, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xed, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xee, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:39 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000180)={[0x0, 0x4c48], 0x7fffffffd, 0x4, 0x765, 0x61d, 0x10000000}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:39 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2, 0x0, 0x8}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000100)={0x0, {0x90, 0xaad6}}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x9, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xffffffffffffffef) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) 18:09:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x157, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xee, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:39 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xef, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xffffffffffffffef) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) 18:09:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x2, 0x10001) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) keyctl$reject(0x13, r1, 0x2, 0x9, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xef, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x158, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) 18:09:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x80000) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000180)="a6c2db4a2ba49d82f6d634cffca8eb013a2e20815073adad07544306f14f765c0b608cd8d0ae6a5ec4d449689bdb1fc13791f56e80aedc6cb4c363c5cc242eb8dd86195fd7a7c6378f575c2df2f96b31876bdde1dbdcdf380cbc7dd4cd3a016442d07110d35137939f06e5e92533476c8a20f76445e6e73276ac9f45fd5ac7bf3c23bf3f6f1da461b8f096770cec38777bf23ce718fb60fc4740e1a38a72cd5dda1e5741df1373418e4b6f45d5fcd26106791573ac928bf41329d9033f8037fea1025db2677165e4579d575e66f64320b375d36410aec60ef0971e4a8203b30a5a170a537a69") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) 18:09:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x159, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0xfffffffffffffffc) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000180)=""/243, 0xf3, 0x30) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:40 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f00000001c0)={0x3, 0x0, [{0x0, 0x0, 0x0, 0x5, 0x9, 0x1, 0x81}, {0xc0000000, 0x1, 0x4, 0x7, 0x1, 0x1, 0x7}, {0x4000000d, 0x5, 0x6, 0x2, 0x0, 0x5, 0x3fffffff80000000}]}) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7ff, 0x200040) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r3) r5 = geteuid() fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v3={0x3000000, [{0x2}, {0x1, 0x7}], r5}, 0x18, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, 0x0) 18:09:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) 18:09:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000180)="9c192d6b6d2ac832160b9e86b0e8450d63f917ac21ad407f6366013332a4c115067bf6175d949db40a8dfc470d359987ec36a59ac076fcc0718877681d2906bdbdbe2557bab59810e2f3b9ddb5197da7cfa876f4ebeb56ad947bcdc26505df663e24624773e2b9386118a63fd26645dde6c4e7ee632d1855bc83917cbbb11313ab08e4c9066d9764d48ed9fb5395fdb03b5cd41ccad36362da81ed6dcc32ddc95663d22f22f5e0679df4c5356880a1c38c4a5f5a78d67b393dd5fd42895063084bfbbd1a88eef9de26", &(0x7f0000000280)=""/151}, 0x18) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:41 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000180)=""/243, 0xf3, 0x30) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$read(0xb, r1, &(0x7f0000000000)=""/1, 0x1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200080, 0x0) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000040)=0x2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x8, 0xff80000000000, 0x2, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 18:09:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa4, 0x100) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000180)="9aa4e88f30d667b0b5ce87dc8abff3fd31d8e62e536a1c9af1c204b8cb3974dac9475b6989615af76d387f46990afd85f9d901ccd13ec142034099d5af6dd7297530cd0e4f57eb555bcf6843d84c9bbd928422eee9b9b4de587ff00135266f998261aa6338230dcbb29778d07872e6dcf7463eba8e597f5ad583372638d0cb4d424d3b13120571", 0x87, r1) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000240), 0x0, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:41 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000000)={0x1, r2}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:41 executing program 2: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa4, 0x100) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x160, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) r3 = shmget(0x0, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:42 executing program 2: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0x101}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) r1 = syz_open_procfs(r0, &(0x7f0000000600)='io\x00') r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x2286, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="08000000489f0dac780d7fa99641898a41d818839b733f1f1b57022cccb58a751a9137732d789b605e2ee8d2c43dc9b8c51a9416ab1177b08386fbc68ad85feebcb74e892e21b22a069158a2a2318fc31e0d0f70", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x24) r3 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r4, 0x5386, &(0x7f0000000040)) ioctl$TIOCSIG(r1, 0x40045436, 0x1f) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) getdents64(r1, &(0x7f00000001c0)=""/114, 0x72) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r5 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000180)) r6 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440)=[{0x0}], 0x1, r5) creat(&(0x7f0000000480)='./file0\x00', 0x1a0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r6, 0x800443d3, 0x0) ioctl$TIOCSSERIAL(r6, 0x541f, &(0x7f00000003c0)={0x670, 0x1, 0x60b9, 0xfffffffffffffffc, 0xac, 0x100, 0xd4f7, 0x3d, 0x0, 0x1ff, 0x8, 0x2, 0x5, 0x43, &(0x7f00000002c0)=""/209, 0x7, 0x8, 0x8000000}) 18:09:42 executing program 2: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0x101}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) r1 = syz_open_procfs(r0, &(0x7f0000000600)='io\x00') r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x2286, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="08000000489f0dac780d7fa99641898a41d818839b733f1f1b57022cccb58a751a9137732d789b605e2ee8d2c43dc9b8c51a9416ab1177b08386fbc68ad85feebcb74e892e21b22a069158a2a2318fc31e0d0f70", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x24) r3 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r4, 0x5386, &(0x7f0000000040)) ioctl$TIOCSIG(r1, 0x40045436, 0x1f) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) getdents64(r1, &(0x7f00000001c0)=""/114, 0x72) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r5 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000180)) r6 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440)=[{0x0}], 0x1, r5) creat(&(0x7f0000000480)='./file0\x00', 0x1a0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r6, 0x800443d3, 0x0) ioctl$TIOCSSERIAL(r6, 0x541f, &(0x7f00000003c0)={0x670, 0x1, 0x60b9, 0xfffffffffffffffc, 0xac, 0x100, 0xd4f7, 0x3d, 0x0, 0x1ff, 0x8, 0x2, 0x5, 0x43, &(0x7f00000002c0)=""/209, 0x7, 0x8, 0x8000000}) 18:09:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x161, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = shmget(0x3, 0x4000, 0x1000, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0xb) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r2}) lseek(r0, 0x0, 0x3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x80000001) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000100)=0x40) 18:09:42 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3ff, 0x1) accept$ax25(r0, &(0x7f0000000180)={{}, [@remote, @default, @rose, @null, @null, @null, @remote, @default]}, &(0x7f0000000040)=0x48) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:09:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000180)="e48cb3245c513b08d0d1126c40e7b6a83849b85da4cd5e7241e8544e626b8067c348105a20b225ea5b686f1e761738596cd3f510c3b34e86c8fb8f360aab24b99ff1d3aad9701a442500011898ae99c24811108702639f91fe2da5f3a5a9908cf11b06a281", 0x65, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x162, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xcbb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x80001) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000240)=0x4) r2 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0xc058534b, &(0x7f0000000180)={0x9, 0x1, 0x235, 0x4, 0x6, 0x81}) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r2) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000040)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x8000, {0x8, 0x83e, 0x8, 0x104, 0x20000001, 0xfff}, 0xfffffffffffffffa}, 0xe) write$rfkill(r3, &(0x7f0000000100)={0x4, 0x8, 0x2}, 0x8) 18:09:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x163, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(0xffffffffffffffff, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0101282, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80041285, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401870c8, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401870c8, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x164, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 746.103488][ C1] net_ratelimit: 18 callbacks suppressed [ 746.103496][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 746.115040][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40101283, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xf9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x1fffffffffffffc) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000240)={0x6, 0x1}) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) pwrite64(r0, &(0x7f0000000180)='?', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000100)={0x81, 0x1, 0x4be, 0xd0, 0x8, 0x8}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x40, 0x6, {"b5b2300510f45fdb4aa7193969b2c7ccdcbc831d63cf5d03a02466bcdb1b3131b22e2a37047e"}}, {0x0, "4c1a1ce3319ec83f1afd0fa590dc4f1a475b94af706cfaf67a29e394945ae5cee429c02b037d8723568e2da5e2cfafd12315f35703e5f5ca060e56d39f8f86d1100f1048807fc370066428ef32b8d79f3b82ffac910edd65b7"}}, &(0x7f00000003c0)=""/156, 0x9b, 0x9c}, 0x20) 18:09:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1275, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xfa, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x165, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xfa, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 746.444150][T18942] input: syz1 as /devices/virtual/input/input9 18:09:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1275, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1262, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/context\x00', 0x2, 0x0) 18:09:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1275, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xfb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x125d, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1262, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x166, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:43 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xfb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x125d, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1262, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48], 0x0, 0x400, 0x2}) r1 = add_key$keyring(&(0x7f0000000940)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) 18:09:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xfc, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:44 executing program 3 (fault-call:1 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:44 executing program 5 (fault-call:6 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x167, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 747.223638][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 747.229531][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xfd, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xfc, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x168, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 747.342081][T19637] FAULT_INJECTION: forcing a failure. [ 747.342081][T19637] name failslab, interval 1, probability 0, space 0, times 0 [ 747.383562][T19637] CPU: 1 PID: 19637 Comm: syz-executor.5 Not tainted 5.1.0-rc5+ #70 [ 747.391864][T19637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.402130][T19637] Call Trace: [ 747.405486][T19637] dump_stack+0x172/0x1f0 [ 747.409948][T19637] should_fail.cold+0xa/0x15 [ 747.414588][T19637] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 747.420438][T19637] ? ___might_sleep+0x163/0x280 [ 747.425296][T19637] __should_failslab+0x121/0x190 [ 747.430234][T19637] should_failslab+0x9/0x14 [ 747.435051][T19637] __kmalloc+0x2dc/0x740 [ 747.439332][T19637] ? ext4_find_extent+0x76e/0x9d0 [ 747.444468][T19637] ext4_find_extent+0x76e/0x9d0 [ 747.449434][T19637] ext4_ext_map_blocks+0x1c3/0x5260 [ 747.454776][T19637] ? ext4_ext_release+0x10/0x10 [ 747.459747][T19637] ? lock_acquire+0x16f/0x3f0 [ 747.464446][T19637] ? ext4_map_blocks+0x3fd/0x18e0 [ 747.469496][T19637] ext4_map_blocks+0xec7/0x18e0 [ 747.474471][T19637] ? ext4_issue_zeroout+0x190/0x190 [ 747.479680][T19637] ? find_held_lock+0x35/0x130 [ 747.484554][T19637] ? finish_task_switch+0x146/0x780 [ 747.489862][T19637] ? mark_held_locks+0xa4/0xf0 [ 747.494848][T19637] ext4_iomap_begin+0x555/0xfe0 [ 747.500428][T19637] ? kasan_check_read+0x11/0x20 [ 747.505414][T19637] ? ext4_dio_get_block+0xc0/0xc0 [ 747.510686][T19637] ? finish_task_switch+0x146/0x780 [ 747.515921][T19637] ? finish_task_switch+0x118/0x780 [ 747.521905][T19637] ? __switch_to_asm+0x34/0x70 [ 747.526782][T19637] ? __switch_to_asm+0x40/0x70 [ 747.531665][T19637] ? __schedule+0x81b/0x1cc0 [ 747.536731][T19637] ? __sched_text_start+0x8/0x8 [ 747.541700][T19637] iomap_apply+0xfe/0x2e0 [ 747.546044][T19637] ? iomap_seek_hole_actor+0xe0/0xe0 [ 747.551346][T19637] ? iomap_dirty_actor+0x6c0/0x6c0 [ 747.556471][T19637] ? rwsem_down_read_failed+0x243/0x420 [ 747.562228][T19637] iomap_seek_data+0x157/0x1d0 [ 747.567092][T19637] ? iomap_seek_hole_actor+0xe0/0xe0 [ 747.567108][T19637] ? iomap_seek_hole+0x1d0/0x1d0 [ 747.567121][T19637] ? call_rwsem_down_read_failed+0x18/0x30 [ 747.567141][T19637] ext4_llseek+0x25c/0x2d0 [ 747.567159][T19637] ? ext4_es_can_be_merged.cold+0x2d/0x2d [ 747.577465][T19637] ksys_lseek+0x118/0x1b0 [ 747.577485][T19637] __x64_sys_lseek+0x73/0xb0 [ 747.577503][T19637] do_syscall_64+0x103/0x610 [ 747.577523][T19637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.615285][T19637] RIP: 0033:0x458c29 [ 747.619461][T19637] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:09:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x301, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x125d, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x125e, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x125f, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x169, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 747.639609][T19637] RSP: 002b:00007ff3bbf71c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 747.639624][T19637] RAX: ffffffffffffffda RBX: 00007ff3bbf71c90 RCX: 0000000000458c29 [ 747.639631][T19637] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000003 [ 747.639639][T19637] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 747.639654][T19637] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3bbf726d4 [ 747.664758][T19637] R13: 00000000004c4a2c R14: 00000000004d8498 R15: 0000000000000005 [ 747.703555][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 747.703560][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 747.703602][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 747.709448][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:09:44 executing program 5 (fault-call:6 fault-nth:1): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1260, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 747.783531][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 747.789533][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:09:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x301, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xfe, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1261, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xfd, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x125d, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1262, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 748.061835][T19993] FAULT_INJECTION: forcing a failure. [ 748.061835][T19993] name failslab, interval 1, probability 0, space 0, times 0 [ 748.078094][T19993] CPU: 0 PID: 19993 Comm: syz-executor.5 Not tainted 5.1.0-rc5+ #70 [ 748.086171][T19993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.096235][T19993] Call Trace: [ 748.099565][T19993] dump_stack+0x172/0x1f0 [ 748.103924][T19993] should_fail.cold+0xa/0x15 [ 748.108541][T19993] ? fault_create_debugfs_attr+0x1e0/0x1e0 18:09:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1263, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 748.114480][T19993] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 748.120215][T19993] ? __es_tree_search.isra.0+0x1bf/0x230 [ 748.126142][T19993] __should_failslab+0x121/0x190 [ 748.131197][T19993] should_failslab+0x9/0x14 [ 748.135742][T19993] kmem_cache_alloc+0x47/0x6f0 [ 748.140528][T19993] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 748.146266][T19993] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 748.151756][T19993] ? ext4_es_scan+0x730/0x730 [ 748.156442][T19993] ? do_raw_write_lock+0x124/0x290 18:09:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x125e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 748.161567][T19993] __es_insert_extent+0x2cc/0xf20 [ 748.166612][T19993] ext4_es_insert_extent+0x2b7/0xa40 [ 748.171912][T19993] ? ext4_es_scan_clu+0x50/0x50 [ 748.176820][T19993] ? kasan_check_write+0x14/0x20 [ 748.181782][T19993] ? do_raw_read_unlock+0x3f/0x70 [ 748.181800][T19993] ? _raw_read_unlock+0x2d/0x50 [ 748.181821][T19993] ext4_map_blocks+0x66c/0x18e0 [ 748.181850][T19993] ? ext4_issue_zeroout+0x190/0x190 [ 748.202053][T19993] ? find_held_lock+0x35/0x130 [ 748.206844][T19993] ? finish_task_switch+0x146/0x780 [ 748.212070][T19993] ? mark_held_locks+0xa4/0xf0 [ 748.216869][T19993] ext4_iomap_begin+0x555/0xfe0 [ 748.221740][T19993] ? kasan_check_read+0x11/0x20 [ 748.226609][T19993] ? ext4_dio_get_block+0xc0/0xc0 [ 748.231640][T19993] ? finish_task_switch+0x146/0x780 [ 748.237024][T19993] ? finish_task_switch+0x118/0x780 [ 748.237039][T19993] ? __switch_to_asm+0x34/0x70 [ 748.237060][T19993] ? __schedule+0x81b/0x1cc0 [ 748.237081][T19993] ? __sched_text_start+0x8/0x8 [ 748.256524][T19993] iomap_apply+0xfe/0x2e0 [ 748.260883][T19993] ? iomap_seek_hole_actor+0xe0/0xe0 [ 748.266180][T19993] ? iomap_dirty_actor+0x6c0/0x6c0 [ 748.271480][T19993] ? rwsem_down_read_failed+0x243/0x420 [ 748.277062][T19993] iomap_seek_data+0x157/0x1d0 [ 748.281863][T19993] ? iomap_seek_hole_actor+0xe0/0xe0 [ 748.287186][T19993] ? iomap_seek_hole+0x1d0/0x1d0 [ 748.292250][T19993] ? call_rwsem_down_read_failed+0x18/0x30 [ 748.298169][T19993] ext4_llseek+0x25c/0x2d0 [ 748.302601][T19993] ? ext4_es_can_be_merged.cold+0x2d/0x2d [ 748.308427][T19993] ksys_lseek+0x118/0x1b0 [ 748.312774][T19993] __x64_sys_lseek+0x73/0xb0 [ 748.317383][T19993] do_syscall_64+0x103/0x610 [ 748.321994][T19993] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.327986][T19993] RIP: 0033:0x458c29 [ 748.331979][T19993] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 748.351763][T19993] RSP: 002b:00007ff3bbf71c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 18:09:45 executing program 5 (fault-call:6 fault-nth:2): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x125f, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1264, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 748.360184][T19993] RAX: ffffffffffffffda RBX: 00007ff3bbf71c90 RCX: 0000000000458c29 [ 748.368383][T19993] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000003 [ 748.376456][T19993] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 748.384446][T19993] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3bbf726d4 [ 748.392517][T19993] R13: 00000000004c4a2c R14: 00000000004d8498 R15: 0000000000000005 18:09:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x102, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1260, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0xfe, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1265, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x103, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 748.704385][T20242] FAULT_INJECTION: forcing a failure. [ 748.704385][T20242] name failslab, interval 1, probability 0, space 0, times 0 [ 748.728990][T20242] CPU: 0 PID: 20242 Comm: syz-executor.5 Not tainted 5.1.0-rc5+ #70 [ 748.737006][T20242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.747158][T20242] Call Trace: [ 748.750472][T20242] dump_stack+0x172/0x1f0 [ 748.754829][T20242] should_fail.cold+0xa/0x15 [ 748.759530][T20242] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 748.765377][T20242] ? ___might_sleep+0x163/0x280 [ 748.770258][T20242] __should_failslab+0x121/0x190 [ 748.775205][T20242] should_failslab+0x9/0x14 [ 748.779720][T20242] __kmalloc+0x2dc/0x740 [ 748.784007][T20242] ? __lock_acquire+0x548/0x3fb0 [ 748.788964][T20242] ? ext4_find_extent+0x76e/0x9d0 [ 748.794004][T20242] ext4_find_extent+0x76e/0x9d0 [ 748.798883][T20242] ext4_ext_map_blocks+0x1c3/0x5260 [ 748.804102][T20242] ? ext4_ext_release+0x10/0x10 18:09:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1261, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 748.808980][T20242] ? lock_acquire+0x16f/0x3f0 [ 748.813670][T20242] ? ext4_map_blocks+0x3fd/0x18e0 [ 748.818717][T20242] ext4_map_blocks+0xec7/0x18e0 [ 748.823761][T20242] ? lru_add_drain_cpu+0x1c4/0x520 [ 748.832247][T20242] ? ext4_issue_zeroout+0x190/0x190 [ 748.847278][T20242] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 748.853710][T20242] ? page_cache_seek_hole_data+0x6fe/0x890 [ 748.859722][T20242] ext4_iomap_begin+0x555/0xfe0 [ 748.864762][T20242] ? ext4_dio_get_block+0xc0/0xc0 [ 748.864787][T20242] ? finish_task_switch+0x146/0x780 [ 748.864803][T20242] ? finish_task_switch+0x118/0x780 [ 748.864818][T20242] ? __switch_to_asm+0x34/0x70 [ 748.864837][T20242] ? __schedule+0x81b/0x1cc0 [ 748.864853][T20242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.864866][T20242] ? ext4_iomap_end+0x46/0x640 [ 748.864882][T20242] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 748.864906][T20242] iomap_apply+0xfe/0x2e0 [ 748.911057][T20242] ? iomap_seek_hole_actor+0xe0/0xe0 [ 748.911076][T20242] ? iomap_dirty_actor+0x6c0/0x6c0 [ 748.911092][T20242] ? rwsem_down_read_failed+0x243/0x420 [ 748.911119][T20242] iomap_seek_data+0x157/0x1d0 [ 748.936353][T20242] ? iomap_seek_hole_actor+0xe0/0xe0 [ 748.941752][T20242] ? iomap_seek_hole+0x1d0/0x1d0 [ 748.941775][T20242] ? call_rwsem_down_read_failed+0x18/0x30 [ 748.941801][T20242] ext4_llseek+0x25c/0x2d0 [ 748.956925][T20242] ? ext4_es_can_be_merged.cold+0x2d/0x2d [ 748.962663][T20242] ksys_lseek+0x118/0x1b0 [ 748.967617][T20242] __x64_sys_lseek+0x73/0xb0 [ 748.972227][T20242] do_syscall_64+0x103/0x610 [ 748.976924][T20242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.982900][T20242] RIP: 0033:0x458c29 [ 748.986810][T20242] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 749.006510][T20242] RSP: 002b:00007ff3bbf71c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 749.014933][T20242] RAX: ffffffffffffffda RBX: 00007ff3bbf71c90 RCX: 0000000000458c29 [ 749.022913][T20242] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000003 [ 749.030981][T20242] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 749.039004][T20242] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3bbf726d4 [ 749.047016][T20242] R13: 00000000004c4a2c R14: 00000000004d8498 R15: 0000000000000005 18:09:46 executing program 5 (fault-call:6 fault-nth:3): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1267, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1262, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x102, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x104, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1268, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1263, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x103, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1269, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 749.500254][T20643] FAULT_INJECTION: forcing a failure. [ 749.500254][T20643] name failslab, interval 1, probability 0, space 0, times 0 [ 749.513101][T20643] CPU: 0 PID: 20643 Comm: syz-executor.5 Not tainted 5.1.0-rc5+ #70 [ 749.521097][T20643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.531182][T20643] Call Trace: [ 749.534522][T20643] dump_stack+0x172/0x1f0 [ 749.538890][T20643] should_fail.cold+0xa/0x15 [ 749.543492][T20643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 749.549400][T20643] ? __es_tree_search.isra.0+0x1bf/0x230 [ 749.555087][T20643] __should_failslab+0x121/0x190 [ 749.560038][T20643] should_failslab+0x9/0x14 [ 749.564554][T20643] kmem_cache_alloc+0x47/0x6f0 [ 749.569335][T20643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.575587][T20643] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 749.581062][T20643] __es_insert_extent+0x2cc/0xf20 [ 749.586113][T20643] ext4_es_insert_extent+0x2b7/0xa40 [ 749.591415][T20643] ? ext4_es_scan_clu+0x50/0x50 18:09:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x170, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 749.596287][T20643] ? kasan_check_write+0x14/0x20 [ 749.601242][T20643] ? do_raw_read_unlock+0x3f/0x70 [ 749.606279][T20643] ? _raw_read_unlock+0x2d/0x50 [ 749.611170][T20643] ext4_map_blocks+0x66c/0x18e0 [ 749.616041][T20643] ? lru_add_drain_cpu+0x1c4/0x520 [ 749.621256][T20643] ? ext4_issue_zeroout+0x190/0x190 [ 749.626469][T20643] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 749.632736][T20643] ? page_cache_seek_hole_data+0x6fe/0x890 [ 749.638598][T20643] ext4_iomap_begin+0x555/0xfe0 [ 749.643570][T20643] ? ext4_dio_get_block+0xc0/0xc0 [ 749.648692][T20643] ? finish_task_switch+0x146/0x780 [ 749.654071][T20643] ? finish_task_switch+0x118/0x780 [ 749.659278][T20643] ? __switch_to_asm+0x34/0x70 [ 749.664067][T20643] ? __schedule+0x81b/0x1cc0 [ 749.668936][T20643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.675182][T20643] ? ext4_iomap_end+0x46/0x640 [ 749.679953][T20643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 749.686210][T20643] iomap_apply+0xfe/0x2e0 [ 749.690547][T20643] ? iomap_seek_hole_actor+0xe0/0xe0 [ 749.695840][T20643] ? iomap_dirty_actor+0x6c0/0x6c0 18:09:46 executing program 5 (fault-call:6 fault-nth:4): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1264, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x104, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x105, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 749.695857][T20643] ? rwsem_down_read_failed+0x243/0x420 [ 749.695885][T20643] iomap_seek_data+0x157/0x1d0 [ 749.695897][T20643] ? iomap_seek_hole_actor+0xe0/0xe0 [ 749.695912][T20643] ? iomap_seek_hole+0x1d0/0x1d0 [ 749.695924][T20643] ? call_rwsem_down_read_failed+0x18/0x30 [ 749.695944][T20643] ext4_llseek+0x25c/0x2d0 [ 749.706569][T20643] ? ext4_es_can_be_merged.cold+0x2d/0x2d [ 749.706586][T20643] ksys_lseek+0x118/0x1b0 [ 749.706608][T20643] __x64_sys_lseek+0x73/0xb0 [ 749.706630][T20643] do_syscall_64+0x103/0x610 [ 749.706649][T20643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.706659][T20643] RIP: 0033:0x458c29 [ 749.706671][T20643] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 749.706679][T20643] RSP: 002b:00007ff3bbf71c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 749.706693][T20643] RAX: ffffffffffffffda RBX: 00007ff3bbf71c90 RCX: 0000000000458c29 [ 749.706708][T20643] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000003 [ 749.706716][T20643] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 749.706729][T20643] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3bbf726d4 [ 749.706737][T20643] R13: 00000000004c4a2c R14: 00000000004d8498 R15: 0000000000000005 18:09:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1265, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:09:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x171, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1275, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x105, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1267, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x106, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x172, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x2, 0x3) 18:09:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1268, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x106, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1278, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1269, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x107, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x173, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x107, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1279, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x5, 0x3) 18:09:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1275, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x108, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x174, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127a, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x108, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x6, 0x3) 18:09:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127b, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x175, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x109, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1278, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127c, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x109, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x176, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1279, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 751.383490][ C1] net_ratelimit: 12 callbacks suppressed [ 751.383500][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 751.395959][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127d, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x10, 0x3) [ 751.435245][ T25] audit: type=1800 audit(1555438188.488:140): pid=21876 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17413 res=0 18:09:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127a, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127e, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x177, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127b, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127f, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127c, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x178, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 751.863499][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 751.863545][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 751.870604][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 751.943523][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 751.949426][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:09:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x110, 0x3) 18:09:49 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4b47, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127d, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x179, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:49 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4b49, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 752.343503][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 752.349339][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:49 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x541b, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x500, 0x3) 18:09:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127f, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:49 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5421, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x17a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4b47, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:49 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5450, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x17b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4b49, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5451, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 752.910254][ T25] audit: type=1800 audit(1555438189.958:141): pid=22920 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17406 res=0 18:09:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x600, 0x3) 18:09:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x17c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x541b, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5452, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5421, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x17d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x10f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5460, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x110, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5450, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 753.418948][ T25] audit: type=1800 audit(1555438190.468:142): pid=23258 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17411 res=0 [ 753.463511][ C1] protocol 88fb is buggy, dev hsr_slave_0 18:09:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x1001, 0x3) 18:09:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40049409, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x17e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x110, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x111, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5451, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40081271, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x17f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40086602, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5452, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x112, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 753.932399][ T25] audit: type=1800 audit(1555438190.978:143): pid=23703 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17425 res=0 18:09:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x111, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x3f00, 0x3) 18:09:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5460, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40087602, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x180, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x113, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40049409, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x112, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40101283, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x181, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x4000, 0x3) 18:09:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40081271, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401070c9, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x114, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x182, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x113, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401070ca, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40086602, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x100000, 0x3) [ 754.767875][ T25] audit: type=1800 audit(1555438191.818:144): pid=24205 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16562 res=0 18:09:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40087602, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x115, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401070cd, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40101283, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x183, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x114, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401870c8, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401070c9, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x10ffff, 0x3) [ 755.186948][ T25] audit: type=1800 audit(1555438192.238:145): pid=24522 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17425 res=0 18:09:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x184, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x116, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401870cb, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x115, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401070ca, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401870cc, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401070cd, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x185, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x116, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4020940d, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 755.628678][ T25] audit: type=1800 audit(1555438192.678:146): pid=24854 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17402 res=0 18:09:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x1000000, 0x3) 18:09:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x117, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401870c8, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80041284, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x186, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x117, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401870cb, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80041285, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x118, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401870cc, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x187, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80081270, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 756.158860][ T25] audit: type=1800 audit(1555438193.208:147): pid=25171 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17426 res=0 18:09:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x2000000, 0x3) 18:09:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x118, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4020940d, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x119, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80081272, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x188, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80041284, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80086601, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 756.503510][ C1] net_ratelimit: 17 callbacks suppressed [ 756.503518][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 756.515325][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x119, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80041285, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80087601, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x5000000, 0x3) 18:09:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x189, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x18a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:54 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80081270, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:54 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80081272, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x18b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 757.219169][ T25] audit: type=1800 audit(1555438194.268:148): pid=25969 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17440 res=0 18:09:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80086601, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x6000000, 0x3) 18:09:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:54 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0101282, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x18c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80087601, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:54 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 757.623494][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 757.629313][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:54 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc020660b, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x18d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 757.778720][ T25] audit: type=1800 audit(1555438194.828:149): pid=26234 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17406 res=0 18:09:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x10010000, 0x3) 18:09:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0101282, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x18e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0401273, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 758.103492][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 758.103518][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 758.109473][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0481273, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 758.183531][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 758.189367][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:09:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc020660b, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0401273, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x18f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x3f000000, 0x3) 18:09:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0481273, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x120, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 758.583489][ C1] protocol 88fb is buggy, dev hsr_slave_0 18:09:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:55 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000f40)={0xffffffffffffffff}) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000f80)=0x40, 0x4) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x190, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x11f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 758.848464][ T25] audit: type=1800 audit(1555438195.898:150): pid=27026 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17451 res=0 18:09:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x191, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x40000000, 0x3) 18:09:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x121, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) getsockname(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = dup(r0) ioctl$TIOCNOTTY(r2, 0x5422) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x120, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3f00) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff7000/0x3000)=nil, 0x4000}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000080)=0x7) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) fsetxattr$security_ima(r1, &(0x7f0000000140)='security.ima\x00', &(0x7f00000001c0)=@sha1={0x1, "5128a387cd05f0175729bbb3a4698ced64de9112"}, 0x15, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000180)=0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x122, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x192, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x10001, 0xaa, &(0x7f0000000000)="67ad2050a641936c6aa355fa305cbe510e4ce38a1eccbcbd039e20db687ca2810f57573028127c823a3109f68b4a5ecabb805aaea6961edea403fd92c3d507db96e3975f1699b23e3b11c9583f830332135a646561781aeadc2fff812b767aa370d4802bedf14d3e56660bed652719805e5b3dd297ca610668be8f86bdf64de69447cc363957afed46201dbae4efebc1f6c6ccf48990e54184cb97663b7b74caefbd9f8c204b94be5335"}) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 18:09:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x121, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0xf4ffffff, 0x3) [ 759.392142][ T25] audit: type=1800 audit(1555438196.438:151): pid=27369 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17398 res=0 18:09:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x40000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x193, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x123, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = dup2(r0, r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000000)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x12100, 0x0) 18:09:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x194, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x122, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 759.791172][ T25] audit: type=1800 audit(1555438196.838:152): pid=27717 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17451 res=0 18:09:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x124, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x4000, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f0000000080)={0x0, 0x8, 0x81, [], &(0x7f0000000040)=0x800c}) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0xffff1000, 0x3) 18:09:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x20000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x195, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000040)={{0xfffffffffffffe01, 0x5}, {0x4, 0x2}, 0x5, 0x0, 0x5}) 18:09:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x123, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3f000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x125, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x196, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)={0x9, 0xffffffff, 0x7, 0x9, 0x6, 0x6}) [ 760.355772][ T25] audit: type=1800 audit(1555438197.398:153): pid=27960 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17397 res=0 18:09:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0xfffffff4, 0x3) 18:09:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x40000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x124, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x197, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:57 executing program 3: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfdfdffff) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x126, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000040)=0x7) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xff, 0x80000) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000080)={0x6, {0x1, 0x1, 0x1, 0x1, 0x7d, 0x1f}}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x198, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x125, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:57 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x4, 0x4) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x401, 0x400400) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000040)={[0x10, 0x3, 0x4, 0x3, 0x2, 0xc23e, 0x100000000000, 0x7, 0x8001, 0x6, 0x20, 0xfffffffffffff9d5, 0xb9, 0x8, 0xc91, 0x7fffffff], 0xd000, 0x80}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 760.838470][ T25] audit: type=1800 audit(1555438197.888:154): pid=28321 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17446 res=0 18:09:58 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfffffdfd) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x10000000000000, 0x3) 18:09:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x127, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:58 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000000000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x199, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x128, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x126, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:09:58 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x100000000000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x100000000000000, 0x3) [ 761.339917][ T25] audit: type=1800 audit(1555438198.388:155): pid=28634 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17459 res=0 18:09:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x19a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x129, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000031c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003200)='cpuset.effective_cpus\x00', 0x0, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000003240)='/dev/btrfs-control\x00', 0x640102, 0x0) r6 = syz_open_dev$midi(&(0x7f0000003280)='/dev/midi#\x00', 0xfffffffffffffffa, 0x0) r7 = syz_open_dev$amidi(&(0x7f00000032c0)='/dev/amidi#\x00', 0x5, 0x2) r8 = syz_open_dev$usb(&(0x7f0000003300)='/dev/bus/usb/00#/00#\x00', 0x9, 0x800) r9 = accept(0xffffffffffffff9c, &(0x7f0000003340)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f00000033c0)=0x80) r10 = syz_open_dev$admmidi(&(0x7f0000003400)='/dev/admmidi#\x00', 0x8, 0xa000) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003780)={&(0x7f0000003440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000034c0)=""/194, 0xc2}, {&(0x7f00000035c0)=""/2, 0x2}, {&(0x7f0000003600)=""/136, 0x88}], 0x3, &(0x7f0000003700)=""/80, 0x50}, 0x2000) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) r12 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000037c0)='/dev/dlm-monitor\x00', 0x40, 0x0) write$apparmor_current(r12, &(0x7f00000000c0)=ANY=[@ANYBLOB="737461616b207070701a766d6e65743173656c696e757800"], 0x18) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000003800)='/proc/capi/capi20ncci\x00', 0x4c0400, 0x0) r14 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003840)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000003980)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003940)={&(0x7f0000003880)=ANY=[@ANYBLOB="ac000000", @ANYRES16=r2, @ANYBLOB="010226bd7000fbdbdf25010000000c000400e1ffffffffffffff0c00080001000000000000004400070008000100", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="08000100000000001400070008000100", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="1400070008000100", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="0c0005000700000000000000"], 0xac}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:58 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x200000000000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x127, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x19b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:58 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2000000000000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) sendto$unix(r0, &(0x7f0000000000)="c17a15", 0x3, 0x40800, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 18:09:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 761.783519][ C1] net_ratelimit: 9 callbacks suppressed [ 761.783527][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 761.795024][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x128, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 761.814916][ T25] audit: type=1800 audit(1555438198.868:156): pid=29073 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17402 res=0 18:09:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x200000000000000, 0x3) 18:09:58 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3f00000000000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x19c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x4100, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000000040)={'bond_slave_1\x00', 0xff00000000000000, 0x100000001}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:59 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000000000000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:09:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x19d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 762.249165][ T25] audit: type=1800 audit(1555438199.298:157): pid=29308 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17461 res=0 [ 762.283814][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 762.283860][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x129, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:59 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfdfdffff00000000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 762.295529][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 762.295578][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:09:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x40200) ioctl$KVM_SMI(r1, 0xaeb7) [ 762.353482][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 762.359428][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:09:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x500000000000000, 0x3) 18:09:59 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x401, 0x44002) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x20, 0x101000) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f00000000c0)={0x0, 0x4, 0x7}) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x5, 0x1, 0x9, 0x8000, 0x46c1da29}) 18:09:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x19e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:59 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x3e6d4825, &(0x7f0000000040)=""/194) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x80441, 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000001440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x70008}, 0xc, &(0x7f0000001400)={&(0x7f0000000200)={0x11d4, 0x4, 0xa, 0x200, 0x70bd26, 0x25dfdbff, {0xf, 0x0, 0x7}, [@nested={0x10e4, 0x77, [@generic="e014ad03b759b8cdfda684e0ba2bd2793416a6f3754fb6f68f522868c900d6257610ed19ba490636cf8a5feb8b97aeff600a94e17828096bfc89b4e62aa9e9915798a7a29f903dd58ea397aa8d12d886f19d094279c6980580d74500d99a26b304c456224c53cf5336eaf70b5ca4422767591d5e6b6cc2be6ac335b1de83a0020b2bc0881a9bea28165b1d3eeb872369fe5f36b1662640b33f88614a60b3d05b1afcf8ef4a66db8842e3d6cce2614b78a2cd6f1b7daa1393be276027939e045b327b", @typed={0x14, 0x6a, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic="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", @generic="40fd6fddc07c7821c3"]}, @generic="2e8d04e84b0860e869a363dc88a546cb8dcc2ea093f24721dbbf94f52187602abaa3d75b7182633b7c3a81ccf25244099e45117b8c1f181df8b3d1663c3fab052eec9c1380e8a119484dff89136af744074f56e756904ea62562d7a307267e75e6ad0e1907988366165234af5a41c26823654edcdc79890a2ca62add10c4bbbed86aee16bc1f6b4f3f9d1fce229b563f569129d0c9a26379f39b5039ff142b4201dfd873ddacbba64bc5dbf9670ebfaea1b2b0c175a8585602b4369c4d4287da612d46ce8f7fe38ca79d05502d57b05ae50956080e4b4ae748"]}, 0x11d4}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$TCGETA(r2, 0x5405, &(0x7f0000001480)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:09:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xfffd, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f00000003c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000440)=""/175, 0xaf}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/215, 0xd7}], 0x3}, 0x600}, {{&(0x7f0000001640)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000001900)=[{&(0x7f00000016c0)=""/99, 0x63}, {&(0x7f0000001740)=""/178, 0xb2}, {&(0x7f0000001800)=""/7, 0x7}, {&(0x7f0000001840)=""/147, 0x93}], 0x4, &(0x7f0000001940)=""/138, 0x8a}, 0x7}, {{&(0x7f0000001a00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001a80)=""/17, 0x11}], 0x1, &(0x7f0000001b00)=""/83, 0x53}}, {{&(0x7f0000001b80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001c00)=""/54, 0x36}], 0x1, &(0x7f0000001c80)=""/179, 0xb3}, 0x401}, {{&(0x7f0000001d40)=@l2, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001dc0)}], 0x1, &(0x7f0000001e40)=""/216, 0xd8}, 0x4}, {{&(0x7f0000001f40)=@nl=@proc, 0x80, &(0x7f00000020c0)=[{&(0x7f0000001fc0)}, {&(0x7f0000002000)=""/182, 0xb6}], 0x2, &(0x7f0000002100)=""/222, 0xde}, 0x8}], 0x6, 0x2000, &(0x7f0000002380)={0x77359400}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xabfaac1741ea3e96}, 0xc, &(0x7f0000002500)={&(0x7f00000023c0)=ANY=[@ANYBLOB="10010000", @ANYRES16=r2, @ANYBLOB="040129bd7000fddbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="f400020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650038000100248001006c625f73746174735f726566726573685f696e74657276616c000000000000bd235d557098000800030003000000080004000300000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000", @ANYRES32=r4], 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x4010) accept4$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x10, 0x800) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffd) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 762.743545][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 762.749413][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:09:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x19f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:09:59 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x3, 0x1000}, 0x0, 0x0, &(0x7f0000000080)={0xe7, 0x21f, 0x9, 0x2c}, &(0x7f00000002c0)=0x392fb81, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x49f}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=r2, 0x4) 18:09:59 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f00000011c0)='/dev/usbmon#\x00', 0x7, 0x202080) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000001200)) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000040)={0x2, {0x5, 0xffffffff, 0x2, 0x7f, 0x6, 0x1000}}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000001180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)="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", 0x1000, r3) 18:10:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x600000000000000, 0x3) 18:10:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:00 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1ff}}}, [0x4, 0x4380, 0x6, 0x4, 0xc4d, 0x9, 0xbda, 0x5, 0x0, 0x1, 0x8a0, 0x0, 0x4, 0x5, 0x4]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={r2, 0x3b, "b4072d0d6ea392137fa149432b89605f49481151b759feff6241860bc2963cdfb85a2e7ca32762900a1cb1e5ef0632a137d2a103084cb7c3839738"}, &(0x7f0000000240)=0x43) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:10:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = getpgid(0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x200, 0x0) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000100)={&(0x7f0000000180)=@canfd={{0x3, 0x8, 0x8, 0x1}, 0x1, 0x2, 0x0, 0x0, "11a0c78cf7fc81c63f44fccc302929be6a3e00abe088111a746af2c4c10fcda48288812128f40a94643c8e4051bcf324e04114d702aed31c04f10d55dd9a6129"}, 0x48}, 0x1, 0x0, 0x0, 0x24000040}, 0x11) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x3ff, 0x100000000, 0x4, 0x9, 0x80000001, r1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1a0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:00 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x80000000000000, 0x2) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x3f, 0x10, 0x3, 0xff}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={r2, 0xe2, "9890d1ad978c886e7be51b91068d467ef11117d3d3b107bcb752a269eb687f862577974b8f7da180982b03b2951db137a5315baa47f5fc7466560a4df57e0da60262c03f7453821a0efb31e0c27fc9998be8a5b84e8a428cdef2e85a45154b9f6424321f00886a3e02397151556f944804bf5a4e30c926b830fd6599756802113e08556a50d256aade3367016bd601ffcceed0fc087c2b528855a305eb0398e378aee8e707ee5842f823527b6c3f7937c4b12743631eee0e94200841157f79baec4cfdabe22f99bffb5909262c29dddcdec8f5288f7cb80ef448bb04cd81f3ed43c9"}, &(0x7f0000000200)=0xea) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) socket$kcm(0x29, 0x2, 0x0) 18:10:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3a, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) recvfrom$ax25(r1, &(0x7f0000000000)=""/36, 0x24, 0x0, &(0x7f0000000040)={{0x3, @null, 0x6}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:00 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 763.365915][ T25] audit: type=1800 audit(1555438200.418:158): pid=30001 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17410 res=0 18:10:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x1001000000000000, 0x3) 18:10:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) 18:10:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1a1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:00 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0), 0x800) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@int=0xfffffffffffffff8, 0x4) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101000, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000180)="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") getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x6, &(0x7f0000000080)=0x2) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000280)=0xffffffffa8d9c365) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x9, 0x100) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001580)='cpuacct.usage_all\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000002, 0x100012, r1, 0x8000000) tee(r0, r1, 0x8, 0x5) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r2 = socket(0x11, 0x80000, 0xf16a) sendmsg(r2, &(0x7f0000001540)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0xa}, 0x2}, 0x80, &(0x7f0000001340)=[{&(0x7f00000000c0)="a9a71c0bdd69d68c2aa0e3a64d2eec1b85c12f495d88199c5a6d18640bc0b042c6e0f637359e4069e4b39e12b70381cc02b58f290d791563635e", 0x3a}, {&(0x7f0000000100)="6a7f502e6f116ed4602a4fdabf6c1e510bbf5c80586ef2551c97930b6a9fff1ffb50f2ef56cbd747cb72678b1f581b0cbc449a60c24c767769a1965f57a9037aabbbc6b8cc6ee6dfb7b036b3526c378fda012c0ebf4e62dc885016d19d6d365631d8", 0x62}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="0271b26bb7009f4f2b4df433410a38248a4158d59ca8f94c9f88cf3efd568718698879124e0c0fd2f51e5ddc35cf0557ac9f5ea1723f221abfc5eadda8872d2bd21d2193cfcbbf6541f2161f1a3890988ba4614b1ab57f2dcfc8fc79357cd9825517f7a41d621de6bd5663dcc2e6fda33a151ee3c83d688694e9972486159c1c9c117a039273a6b30db18dd4acaf9d1b58e23eb8da4138b4a0e5f62ff7b27a0854648434149fb60836820c655b7c6e00020666bb49c75e7ede35e746f127fd08034870fb84cd", 0xc6}, {&(0x7f0000001280)="77e1522c06ac3c26120fcf745e045b0353dc788237d26e90eb07280f7b67cae682e8acad3b1ea3e88cc9dfc3cf7791f5c2f643bca60c0f244d60c6b25cd47d30fdfacde57f673341433d1878a5a05ba11a618ee2ba9376259db1eace1da7197c5f8485f6bf68c12a57845dd0014a1664b0617aeea7c356018a6744e04bc5fb7ec57e32854a880b1017c8c8f8ea34f4e005", 0x91}], 0x5, &(0x7f00000013c0)=[{0xc8, 0x0, 0x2, "c4214ac6aa0612328a64f98a9560f666d3d81ff609b4490ad62ceee53616191e52ae44e34c7755f9c7d2f245cdf573d5e9d3898f0c363fcb1218d0e61a6a43722b7df2069dfe782706ccf3ad52dabb2538e26be93574d6eac3a764b7b9e3b0cd2ee8827c0fb1c5cee7e7456f3ad091f6b58080e9f8dc9e189ec7ab5e40c77cc0cbf8186dcbeb98873bcba9251243495b2c25a48d2b74abc8e33dacdad3efa9325d9d7d60a2ce2fd261fff42aff2eac6c9b15f095"}, {0xb8, 0x117, 0x4, "30a5f66949ddfff164ca46d6870164caa962b392503b46a6d3e966b66d03fa0e801b696aafb719cfb7d70640e08f90728be53cd422c617108b7cc38280c897395f41d539662f7e80244589a60195030064aa1a04a85d994af3ed729de36d0538c9f67dd33f844f6182cc4c86a8563b3911732ec0f5ff82249aef13d89dc1323a2bc6a0af266ecf649ebc31323420c39ffb45ee7fd27b51aa5ce4eb52703cd80cf6"}], 0x180}, 0x80) sendmsg$TIPC_NL_PUBL_GET(r2, 0xffffffffffffffff, 0x4) 18:10:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1a2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x40100) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4001020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="2002db79a3641b21c3f5a627bd70000862ce537d00000000000001f8ffff0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x20048040) r3 = semget(0x0, 0x3, 0x248) semctl$GETPID(r3, 0x0, 0xb, &(0x7f00000002c0)=""/240) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) clock_nanosleep(0x4, 0xfffffffffffffffe, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000040)) 18:10:00 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x3f00000000000000, 0x3) 18:10:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1a3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x130, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:01 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x40000) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000080)=0x5) 18:10:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1a4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x805}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x94, r2, 0xf12, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x54c0}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x70}]}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x8000}, 0x40080) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x100000048003, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x20, &(0x7f0000000040)={@empty, @empty}, 0x8) 18:10:01 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040)=0x1, 0x8) [ 764.229580][ T25] audit: type=1800 audit(1555438201.278:159): pid=30547 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17475 res=0 18:10:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x4000000000000000, 0x3) 18:10:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x131, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:01 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000040)={'veth1\x00', {0x2, 0x4e23, @rand_addr=0x7fff}}) 18:10:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x20200, 0x0) bind$nfc_llcp(r1, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x6, 0xfffffffffffffffa, 0x7, "79d708d41d0b8143886216850505d120458265ee6cfe3fd187ca7fc96b1c1a41cf6ef2899577915c7e80de089a10ca91950c352a9df9f8227b1b4ef3f87b4a", 0x20}, 0x60) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0xfbd510022d1a9332, &(0x7f0000000240)={@ipv4, 0x0}, &(0x7f0000000200)=0xa) bind$xdp(r1, &(0x7f00000002c0)={0x2c, 0x4, r2, 0xd, r1}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x3ff, 0x10040) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000180)={0x1f, 0x7}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x6) 18:10:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1a5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x12f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$rose(r1, &(0x7f0000000040)="a34859090c33622549c3fcb2fc888a2f4e17d7139a75de13aafb4f63e7fdf3d9a1463a40e8908fce8478dbb51df5f28db6fa0314322c1d8b80a6", 0x3a, 0x8000, &(0x7f0000000080)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) r2 = request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='/selinux/policy\x00', 0xfffffffffffffffc) add_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000180)="dcd9678a9d9d7ccdc1062d9b1227b567fd5d602b9005153521c8071db29f27fd0542812a5f9aabe2e5ccd3d87fe526a5f26fb2f997a186df2797878d07632ad6da98623d7e0110b1cba046f4ba5937aba2b338064e5c1e4f84310f137bc9f7b2438606415009a22d12e0101771", 0x6d, r2) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x132, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:01 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x80000000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000040)) prctl$PR_SET_DUMPABLE(0x4, 0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10043, 0x0) sendmsg$rds(r1, &(0x7f0000001180)={&(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/61, 0x3d}], 0x2}, 0x40000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x130, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1a6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 764.712761][ T25] audit: type=1800 audit(1555438201.758:160): pid=30874 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17468 res=0 18:10:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0xf4ffffff00000000, 0x3) 18:10:01 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xb4f6, 0xfffffffffffffffe) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x3b268) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x133, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1a7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:10:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0xc0000, 0x20) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000040)={0xfffffffffffffffa, 0x1}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) fstat(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file1\x00', 0x289, 0x8, &(0x7f0000000640)=[{&(0x7f0000000180)="30f374fdc3e226aa1e1c9361a9577c841cb4b431b8ac67a0c2ce6cbca0b22d1ba34f18aded42433879e7c5cdc3b2de9005945c4e9360629c6cf0414a4b2403cc52bc06bb46cc5fac0504acd740679b3da510680b5d4f15eb2a110cfeba746baa2cb1254c4d7cfaaba43066da04764da2835b833964c5960f77ee476221066017d96da46357416554f860f7377b30d324ea", 0x91, 0x401}, {&(0x7f0000000240)="186d5434b17f8d03e450fbf08b62f2ed8e677b33f3b75ded12b3baacce818c9857186f650f27fce486ae7cfecd59d3b54a2f9e4ab3489e12883acff0c5130fe51e6b7f05a7d36e615328a340530e04eac3a6fb4ca480c19687e0e4263fafa0f1b05d6d", 0x63, 0x800}, {&(0x7f00000002c0)="3b5aa00df83c252f5421db7735ecbc9f5e51d9b512cdb20e856c9a0cb33321d5ce4f6c6761f0f74df9056677c5f83082215ab987a1a325d102829a0c487b5c372f80caabd52e6e84f50e0da5ee0d1be685a6059fb31565e706a2c756403a90f2c69f04762a308387a9dc5ac00c9ab70d3b93e2ed3c73f4bedb2e4b9a4c1349c0c59e6d1a2beee203a9f00338ac99f45996a29f305202c452772f28b17ad0e4fa4dafec944065fb70d64945ef0b5b9ebd4a5c9de3d25fd0ceaa85d6", 0xbb, 0xb489}, {&(0x7f0000000380)="dde29c43a3512d5f1a4e27ab2f9b8b90ae05b46fc352bdae4aee12547c10290066f8bf328f40b3ad135a24da5ac09b5913e0384c0a37d2dc39bcd3e4907c1715c26f61473c25ed9c3e0c50388c473cfe8f8a38c9a8a8cf8fc892d9c251de813f7df862cb356fc7f9814e4da7d0813dd4c921d9e38e82948db3c7eca91eee9ce4736b96ddab9ae89c5bcce5ccaf59973e08a216260181a2b2ef4191a4c299005c6de16b22577b88f9e6f792896d7033cae3b1a24d2c736dfadcfa46b47ba7bbff25d34ee0c2a8e8df73ab", 0xca, 0x68}, {&(0x7f0000000480)="fbad0af3f26654059ba64c07926a60901d3f90bcd820f9e678c0f992fbd9661b02fb6a3b58d89868ee8d03bdd6d51d702ee05ae9377ab544ec97fa4eb2d13efa75b147b485a080a2200c27d207c1822a9fa783e633f5bd8e10b7957e7e3417774d367390af9d9fbc16c7e827168c069895391deb8d89073e5f7ce794867ad1965e2bc2d36a9b0b6523eed677da4843d2d7db31e29f7f8ea5e8a76f4a014424cbd02c88976a3ad45d5291932838216ea29a79166378b3f2778c9bcf4b093350ae0d7439541657972685d9a796bd6d5cc3", 0xd0, 0x100000000}, {&(0x7f0000000100), 0x0, 0x4}, {&(0x7f0000000580)="062f0aaeaacfb547fff1cf612a17dcb609c4f16b9d7cfe54ff3c1c4be0d12855e9ed0b234516a32c28dd64ddd4fc09f3dda09c170ed9ebfa0b3b59626d797003577380ca4dcae799ebefeb291682", 0x4e, 0xffffffffffffff25}, {&(0x7f0000000600)="4bdcca76b295b04cbcc82d6d33f84053b107c2e830b67a2efeae5de1a9de372242505e2a965a39b253502253", 0x2c, 0x4}], 0x200000, &(0x7f0000000780)={[{@dmode={'dmode'}}, {@nocompress='nocompress'}, {@session={'session', 0x3d, 0x30}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@map_normal='map=normal'}], [{@audit='audit'}, {@smackfsroot={'smackfsroot', 0x3d, '-bdev*'}}, {@uid_eq={'uid', 0x3d, r2}}, {@pcr={'pcr', 0x3d, 0x21}}]}) 18:10:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x131, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0xffff100000000000, 0x3) [ 765.157891][ T25] audit: type=1800 audit(1555438202.208:161): pid=31232 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17468 res=0 18:10:02 executing program 2: fanotify_init(0x8, 0x803) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000040)={0x1ff, "87d60809b2e40e789597ea3362d69323a7d0b3cd15a52548a5266b9a6dc637f0", 0x2, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:02 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000240)=0x8, 0x4) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000280)=0x45) ioctl$SIOCAX25DELUID(r2, 0x89e2, &(0x7f00000001c0)={0x3, @null, r3}) 18:10:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1a8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x134, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:02 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf, 0x1f, 0x2, 0x7fff}, 0xf) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x132, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:02 executing program 3: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x7}, 0x10) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) pipe(&(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r1, &(0x7f0000001240)="7e344c8fb43f7b8344d194d7c9194c96f8e633af4fbe7804b53765cdd6355ddee88f848544ce40487b8a0126699fd29e43028e6e90c461458ad3a26f06e73e277986c78989c6bbd66843dbc459cf251672679d2cefd4d9c66148c99bffb4f1ebeaa3b625123614bfdb35cbaed7f4177b47cf4e388abd", 0x76, 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1a9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x135, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x3, 0x7, 0xbc9}}, 0x30) 18:10:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0xffffffff00000000, 0x3) [ 765.643943][ T25] audit: type=1800 audit(1555438202.698:162): pid=31550 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17469 res=0 18:10:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x133, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:02 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000040)={0x0, {0x2, 0x3}}) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080)=0x6, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x32bc81, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00', r3}) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='1\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000029bd7000fedbdf2510000000080005000100000008000500010000000c000200080002004e2400000800040006000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x4000) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000040)=')\x00') ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1aa, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x136, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:03 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000180)={{}, {r1, r2/1000+10000}}, &(0x7f0000000100)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4800, 0x0) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f0000000040)={0x6, 0x7}) 18:10:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80001, 0x80) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000040)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0xffffffffffffffff, 0x3) 18:10:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x134, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:03 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2000, 0x0) 18:10:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x100, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e22, 0x1000, @local, 0x449}}, 0x80000000, 0x9, 0x80, 0xcdf, 0x3}, &(0x7f00000000c0)=0x98) 18:10:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ab, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x84000, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000180)={0xc0000000, 0xf, "c67dd244d09715c448765df728c0cdb7e04d657913a748a12cb3243bdc22fa67", 0x0, 0x1, 0xb713, 0x3, 0x3, 0x28d, 0xffc00, 0x1, [0x8, 0x7, 0xffff, 0x101]}) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x200) write$FUSE_POLL(r2, &(0x7f0000000040)={0x18, 0x0, 0x8, {0x9}}, 0x18) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r3 = gettid() ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0xf649, 0x0, 0x7, 0x4, 0x7, r3}) 18:10:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x137, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:03 executing program 2: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video1\x00', 0x2, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000000040)={'hsr0\x00', 0x1, 0x7fffffff}) 18:10:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x135, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x4000000000000002) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r1, 0xffffffffffff66ea) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 766.490925][ T25] audit: type=1800 audit(1555438203.538:163): pid=32061 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17479 res=0 18:10:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x2) 18:10:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x138, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ac, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:03 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000040)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) 18:10:03 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x136, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:03 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x2) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bind$ax25(r0, &(0x7f00000002c0)={{0x3, @bcast, 0x8}, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/12) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000280)=@get={0x1, &(0x7f0000000180)=""/225, 0x1}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10040, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000340)='vcan0\x00') 18:10:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ad, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x139, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 766.903519][ C1] net_ratelimit: 15 callbacks suppressed [ 766.903533][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 766.915095][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:04 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x800) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x820001, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f0000000080)='/dev/loop#\x00'}, 0x30) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000280)='rose0\x00') ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000002c0)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280), 0xa, 0x1, 0x3}) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x56, 0x5, 0x6, 0x2, 0x0, 0xfff, 0x2000, 0x4, 0x8, 0x8, 0x4, 0x1, 0xfffffffffffffff9, 0x208d, 0x4, 0x0, 0x8, 0x401, 0x8, 0x401, 0x7, 0x101, 0x8, 0x6, 0x200c, 0x3f, 0x9, 0x7, 0x1ffc000000000, 0xc6, 0xa0, 0x2, 0x0, 0x800, 0x10000, 0x5, 0x0, 0x100000001, 0x0, @perf_config_ext={0x0, 0x3}, 0x4000, 0x4, 0x7, 0x1, 0x3d, 0x1, 0x4}, r2, 0xe, r3, 0x8) 18:10:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x200000000000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = getpid() sched_setscheduler(r1, 0x3, &(0x7f0000000000)=0x2) [ 767.019544][ T25] audit: type=1800 audit(1555438204.068:164): pid=32464 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17481 res=0 18:10:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x4) 18:10:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x137, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:04 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ae, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0xfffffffffffffff7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x81}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000180)={r2, 0x1, 0x2}, 0x8) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:04 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000040)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x138, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1af, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x6, 0x80000) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x6080, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000100)=0x100000001, 0x4) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000080)=0x2) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400000, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x2) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) [ 767.492645][ T25] audit: type=1800 audit(1555438204.538:165): pid=377 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17425 res=0 18:10:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x5) 18:10:04 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00q}K\r\xad\x85\xa2\xff\x814x\xe2\xc8\xef\xef\x7f\x05!\x7fH\xde\xd1Zm\nd\x97\x1f\x9b\xb7\x9e\xdfS\xb2AOF\xb6b.\xd4\xf7\x8e\xec\xdf\x89Z\x91#\x89\x872\xed\a\xe5\xd4^\x81<\xec\xe6}\x03\x00\x00\x00\x00\x00\x00\x00\xdeF', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000280), 0x2) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) mincore(&(0x7f0000002000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/126) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1b0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x1000000000004, 0x2890) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$NBD_DO_IT(r1, 0xab03) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x139, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:04 executing program 2: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:05 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:05 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) close(r0) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x2) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffffffffffff0000, 0x880) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1b1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 767.982803][ T25] audit: type=1800 audit(1555438205.028:166): pid=724 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17470 res=0 [ 768.023486][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 768.029332][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:05 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x10000001, 0xffffffffffff0000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x41, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0xb37e, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x3, 0x100000001, 0x7, 0x3, 0x100000}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x7}, 0x8) pidfd_send_signal(r1, 0x17, &(0x7f0000000040)={0x30, 0x8000, 0x4c}, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0xf) 18:10:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 18:10:05 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x10000) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockname$netrom(r1, &(0x7f0000000180)={{0x3, @netrom}, [@null, @bcast, @bcast, @default, @rose, @rose, @remote, @bcast]}, &(0x7f0000000200)=0x48) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl(r0, 0x2, &(0x7f00000000c0)="3b98ea88c2f752414701e2fc4484dfd39e76adcffb1cb35f865fa22eb962b5fcdf66002002c247da05bfc8e11173e1eda4e2fa765d58e138366f2640426b0355cde96d775bd423a86b6d36c6cb6ff7dec31e1d1cc2b3a31f2029965167052cf19d925372b0cf98ef3d1e958d33deaf8a70ed8ed0e705d29c1320480a9b87d05c") 18:10:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1b2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:05 executing program 3: set_mempolicy(0x1, &(0x7f0000000080)=0xe3a6, 0x7) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @multicast2}, 0x10) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x44040, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x1) 18:10:05 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x200000000009, 0x80000010000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101800, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000007b40)=[{&(0x7f0000000080)={0x27, 0x0, 0x0, 0x5, 0x7, 0x7, "1a2f703e6f5a455dac465ed5bcc9442385b9266519bba7bb9f3006d8333ca78deb6a9eaa1e2f9fc09a6ed5fed67e6581f2040dd27d8f189a8115fd8a381291", 0x5}, 0x60, &(0x7f0000000200)=[{&(0x7f0000000100)="bd0c4581888f8629", 0x8}, {&(0x7f0000000140)="b20f2cfb96a9671b89c3cb3766416caccc7bf1a344867f1d34cec9ada1e9d9aba185edaaf908e33adb0d845660b613facd4011ed86e07271ff0a2dc7ffff6f3921e4b4f1823ca524782f6be5b717ac4546ca281d5f483543bf32740b24208bd0a0250b22df4b130a16b6db622c73994dfdc55c526217087125b4b4e0141fdd3798836706eb7b64c578ee61367f65710f875b56feb34b", 0x96}], 0x2, &(0x7f0000000240)={0xe8, 0x6, 0x8, "c55963c563f71c8e5ca6ebb61fee35cac52ccfb97967b77d6dc3a9572a7fbd0b04155b8b392664a74bb68c874518ac3ec8374174d7961d085c70106207f703c3523659bc0d3c3bb4ac793c7ff78a1fbb505b31fe8537ff2c4a22cd7b49e6538c76e793623f314a00c0a9e5597269d4d14bfab5bd8efca9638aa5c87cea213f4a4329c19f613adfa39471f766039fd68b08860dacbb50bd409bd56668d397019eaf3a884adfc1aba76f316d096a03c5060a522c4c56604d8fe56532b0270f8b0865e845e012ec5464e9c9c6722a4c7c6e33"}, 0xe8, 0x881}, {&(0x7f0000000340)={0x27, 0x0, 0x1, 0x4, 0x8, 0x7, "6604f8b46677acaddfbcb3f23047ec0cd930689235d9fa3db228ce4e1cfd890d331b58d6145a22a3929cd0e6850029bcb7086189e90a765afbf593bf57f5f8", 0x16}, 0x60, &(0x7f00000003c0), 0x0, &(0x7f0000000400)={0x58, 0x13f, 0x0, "aeef50680d5404859798d94432fa0c8abc8f3344b46d9864523dbab94099ea222df238fbfb8e2445620bbe8c257b8dea2abb96c13950f1761067260950de0bde97969d37"}, 0x58, 0x40000}, {&(0x7f0000000480)={0x27, 0x1, 0x0, 0x5, 0xffffffff, 0x6, "5b545e01b5d43305e8d6b472e9105b1ccc731dd3dc07fa082dcc603020222e966ab04bd5ee025bdd7286b6e9bf0fcc8aac1faa05f065cfd7da0dacd8eaafb1", 0x1c}, 0x60, &(0x7f0000001600)=[{&(0x7f0000000500)="06504d18dc30d87db13dfb31a0c90d28f1f7b162bbf830fabc39325ae41d1cfe3cd864d2d9ec39a7b5a5d3d9b77505aaa4410b39b40ad1d6e699216d727c467759583745562e5ce5141cf57b9482f903d9bd90a33ccb6bd94c", 0x59}, {&(0x7f0000000580)="140f0a11e66df76afaf03cb7870f0ef726db4436f7ebc1213042bc7cbc77c544ae46ae67189ca24744b0cca7246acbedb3cf5f0251b4c995c101d8185f29cda315659aa5d3d9ec66be61056d8f583c7f49578721423621ad717a287ce54a17615aae5c8277a12503dc1c4fcebe32d301cee8c377d25ed673b62498b7955c1e1f30bba88e063fd3b59425fd6e4f2261f78868892dd674295ae533f380b7aba39fa05721b9cf577f59e01f1666c2b1dc1c70d6895db953e0327e0ee0ff8d3c466019e5a91f15465c9b2c826a5a4639a765d362f0cbe23e1f981e438244cada64bd2de4af6c9449c6513573866ec7208e6cf28ede724c43ca8266bc33549a7a94a128743eadf509057daf16fcd46b8178676bc738d85f036b81772e0c948d9b69319bb977141c7cebebdee84b1e06a6813b9fa93b412670919a23c453da1543a84e336b8109f1eff54e2b3e27b2b2c7e579e7c354eb0ee12ef1eb56f9dfb1c253480a06e7bb65f7a3ba12c3b7e23525e3018488a0947e722f49483e270d5ae3ae60ebf9a35a380caec7eac78bbfc1e63a29fec85246c6c085f83b092b36f07f1087802373c02239c3d6061832ea0aa11ebe99e39d79de128bb64f3c73756778860f2259ac3dd0a2643b4f4b82fdd26943406946b10a5036698a319732b630353c034345e8a7b5a14eeb23cb622c4abb3f349407f25c447ef8785e30337144d93f38a9f9e7e4c2995ca7b23e3ae59296ac346b359d30a5a76cc075e010b90d9edc5d8488c674b0c4d6456db1d6c13a607521a7a1641c5627b59ff5afbf31b72714f3b8e521959a5db6e7c980aa68f70bbe3dd12c6f5ac68192321a961774511ff4fa89f1d53b58064b29e1280d81eec0ba7a234e3cdea62618d4fcce407459fa6a914732efb93021b973fa15e64b7826d0622f4afbf50e02a16fc8c3dfebe98e89508e986e251fb226445a4176bb8f2cff5adf0845b6f743e634502f9417342102786df565141a031567d39f0a32a73b7954f7e5d07f9ba6161a60e802185af08874fc12d5b84a23ebfdb02f0681d8912cc46bcc73bf1bdefb331e174b19d7ed5adf8cb6c1c2b3c4d8d9977597f52320f6af0e3257a038a2ccdab6933dc822d8f7c6191555b27601429843e03b57f2b504afbf7553a8b3d05df488eff6a19c9e1ea206560df9661d79ea137b1e86524694068296576dd865e01ca4fdd445e28bace7b10fda6463cbff4248176a83f5c9865fc1c1ca353ec487c258eebc9a1c58f155349b63595b9111f7bd47ec461bdb36093b83741629c2bcdd384ef0fc8f217403ceb053ece40451cdaef07591b2ce077113e3847d074da3119a5420287de2740961c6c3aaad9bfef8f80811ca3c172386000e8ae4864a4d5ea6fbad6415569b654e9b40098b4a6e00e1eca7c3fe951a863d4f589b78cf1c2706db65f601e919ade8df8d95f8deb5014c500156baf5acf4c2292fa0d43f7b28150beaff6ea92f1808bb6f27439cde1b2538910f316619600dcb1fa6e9df8b742f75966c8c2eb847f4a71d084901bc80c0ea1c405cdbd3b3aaf9b352775e95d71b46ed6260917e3eff697a1906350c925adfe366dc8fc0181d4e3f7f0cd08c742359d07821d2270be787357bf91409f4742eaff7fb917a99f798b8ba80103007a77c79a46e30ceeeee5c180e74dfaa865de3b6e7074e5e46303d0b1a6e77366b63c564c6b1a6c89063e91edd8352768539a7d50fe8385d98589ea569d1c670fac7397d6bc5a7a86bb9f0c7bb0540bd47748d46268ae6b8cbaf49904e0c2dba36c3c0d7915288e5a91fac75784d9e1377687d97f5220044f8b52d9584d9df130631e1683578bd6e1aea283d4aa4eaa64ec71f3d923ae7fe27fed93a0bce59b73e032851eb00bada1673e28369c9d4dc3ba336f76ffeb9f32414686638e74435da970b04f32eb7ba5f696cbb671750382c4cb33c108356418d70560ab3bcd20fc22597a7053fd355d92d7301b5804f68cf545fb0c32d2582e6813b30e94b560991e46ad04b96193480f005911ed7f9fb4382c502ccea0336518445caf17354fc4e8332299973b43610550aa26fe66dba7f83ce495a9038068a522d1e5da10a14cf73f642f168da8d9134bcf700fae3bd2d42b4809946fbb0e4ee2d07f17dc11ef695648ad647ffea877c033675525dfa68273952895f59f9f88ca4297cc5f1b0aecb89a514d8970aa5bf79d84320d7d80b0e42aba54c9b446f28740cc494f1494d49748453e8d54c4cc23ee2c5553c59982aabec4f801a411865cb7dfb38e6fbe317092cf8591766dc04a2fd5f179d46812b9862bee9dbab7d88990c90a692784d3737b2aab9b36e4948e07e4d509bee35fbb6a7d96b583463a54c19ea950cc39844ebcb3df1e66d778d9e4479ea07d7c97b00ab2c2769cdde79a357097d6dd1178a6f28635e694136bbff5fd12780e6562e6698052833cc545f958aae3f73e2ddd853476a2db743ed1288a81872abff89fd23ed3e83e2738429ed7778112bea65a9bc58efc915ea9e40073c7bd127477cda4b4b9125a6451ac4871ea5ed89c95e2d8b00033028ea5ce1ab82acce3c77e956a0988e4c3530634364e2a90990d29f458cad714cf506fd60f02f11055239bddb909a0f39a1a1fc96538ceef30f731d59023d3ed865c361c4db43cb9a4c5d6361aefe4ff99d101c099a27d73e2ba3776293ceda7c57f596a6c6e3b17b4de0406d74c9ec91b7da6c2382ec4ca707daf25e4ca1a793466ea74528b6e3bf714867cf3c5ac9f6e50a81dff4d72bbd1fe26fd57ff4d9e4e2c8364b340a6f59b6991ecac680abb99ff6b28dc5b31ca436420ceed66cd7d87e0cf9c7614b0bfea843363d89167590af9ec5294271f36e7c3ce4f3cd6f8458b7626389bb0c4e710c6f6c2bac8843f200666fe40bf9b0d0cd76cbae03e4be465bb79b2567f60413a7084c2d76e6913b36b33c89000824b6e30beae098920068dac6641f3a65dd8dc7bd1453c526f46dfcd9f52a67e1acd32349ce216566e20e23281d00cdc8df4ced789a57ac8b9d97d15e5005ed5809bd4afa29ec06c3d7e60443cf96e2dd47ae1636b2ba0e381a76c0c61d0ab28b77a2c49b29b5f1c7b2c2de049daa0548428901a0059e4a9c22c2d45ed472c324efcaba545f71fb34b3e15dc10e23dd53efc804a00e07383eddb4905f51d057c5b001d204d1557d70395e28e93e930c1303b7926c3dc295afd7300ce1b246e14be018c241882108c6085bfd262b646dbc5bfb4645b8e59efa96ed2596db06e1c489bc4324f9dc530fe6ac3437216e43dc2030b624a43147080df113af1630af163678f585e1a074e113497f24c5c432187bcfb66c090ecdd716e2db5ff05296b27608772d66d0acb4ef09579a1afd66e3b3d41ba0231a6df78b89543eeda51e72b568154ca52557afbbc5822e40fb88992746343450ca8594100c17678633798ce7d781b67c3e677f850f7dbd270e39c490cadb8176b95000015363db9af037f33c52fc1ff907db887487863522b0b68ebf3b271eb50e6f4a2e51f17acba84bb4921a6c7b03a2d512bb35aa260618b30840fde11371461f6902f138950cc17f58ba0a9185cb89643d421d9fb327dafcc40b51602910c47cd2bded667f06203c99797bddb51b37d978de79b65ce11011511e3f5561efbf5cfec885a2e7c4e72260805772c3127a9d1fe08cfe0c77777cbb14debb2bc26ab6ea71c2e7444d08352687f70b9a60d77e512fce443ee9ac5ee5248378e4581258efa7f06fc67f25f616b3804ae64f26ff2c3ee740ef63549c23865c7162791c0ce9ebf279beb84004ac500a511f14e95c86fdebd37b87c1995619af94950a41645cec81e972e88eefe698b413aaa3dc20330f247c81db67b8173f2aca9676a592782045e6d63b1008bf4c0936510bbcd146313294c010ad869263a8511e3511dbf0897bfcc730b9a32bab04980bc8630ed12be1f5d640110ac1e2bcaa9623152586ff177c7426eaffeb8fc5a6c09a0bf930b31bae75a3e3732b627e1bebbd5376b72d6fd9082c39d5c152f14327b66c30965cf16ee17ad0fa251713c4af85a72a754fed6db15358c35cd3d61f434dca31bf456fe913a9bbc49121cd3dc37fffd1143f54642045cb71e7a267a871c1ab213f9cdb279135c20117466aa5ef18962f0c1e51965620136bd39c7be25302eefe1f326b163f83ea59807b07775b2ee2c07368d84ac4ce1e74105f90dcfa66b6f65465431c03704e71a3bbb35436c411d4acbc64626a27fada6d8055766fbcce554e3ea37426d2c3aa2f05803d871b9051e253489a1bf489396d69e45ecd5d9d906000063923d56a7d34f587860fc519640f258fbc90c677054613dedba49dfe9e9a0e854c9f24dc79be27b7e45bce0a562781a5967a1eee970646cef91f8d936632edd795df20df4216bf3404b56dd6d5328795867ba2fa29b530a9988f39eae46c93eea1958b501dceae34002f08c99defadaceeef33e5543e0cff8358fb5977b08ef6b04631561c9027f8c997311daaeac53ec3eb785722826fb92db76ab6b510991d5e0ece9cce7fb157a7a4bdb9d870e11ab06447b910e07787a1d832ac34f041ad1734702c049993d775340dbfa69d45d50a9b28676525240599a35dc43d1393fc53c6bfc31e60caf2b7f08cc8b74141b8612c67d76ffa3a57a0517078164ecd27c421dd8ee0521cfd79680fc2fa7de1e97922b2c55116e809312aece54c7334a21098f77e8f4570dd75514a3077bfe0f55b88af2d9cc5c85e08ef18a051875a1666a627a480faae97ec2f306984efadea9fc698c40bed1b5840cd187ca701147d6bc68dacbb0b71da40bba55f71e3830f63c77f8b3bac9454f49a3b01f9500a5b2191d3a710b7bc28eb40ac7211a41f67fedd7f07186f816b1f800362b306db341f3dbc737d3a953369b35f942b05fd07ceb26692f9a256d19bf56fee781edfcb2e59200c4a32aeb44b21d704c17344a6ce5c00e214a6003b4936e02efe42796c663f5d2a7eac8fc9f5b13a8dd15c642a5374d92a96badcac45badf8ae8eaad57f7e516c057eb01b2b3ce3431eb7f2618eb923f519e40e3f9f8e01f05165fc1fdede97123690cc93d3ff63bc19208d7970c3793d2ec0f9be74d321f9f7fb663541b2e4c595da24605e523806982a5d0f4315a306112e9de0d6549cdc1c984f5e70d753016f80174a26805e67d8bcd90d10d323e92f3cfea4d7fdeba44f98069d0ae87a4f94a636378b0c3a591297bf6a0d6407f6bae5685b64779d412a4fe7cb5461fbcc11dd8a485218d56d9953b9c62afc237e528ade42ec3a39d4301bef49f9c5a028460a7d65600a3be0cdd25cacebb623e754a5731310d467a4fb54f69f5ecffb31c723b9ecad37b548a19c3803c58de9780adee65bc805f68ef9d6a79c3392211a8aa481284510273b7faca055dbc3f9e27a0ce72a38ae57a68212d2d3e4c5cbe44ea3217592d059fc5a35b34cb981650d6498d1263e09dba79d425052b5dccfbb232b70153d7dafbd7e1c06ec4808305bc5498f9e757569c97b850cc94160ee811b32fe75876740bc73eaa6e6e0abf3b822ce10aa6cc54ea33f1c06fa16a05b0cdd863ad609ec90e3204da75c4595db540bf12c16c67c864f61983915c47fde500655cee72e577e2580252e81b7bdee4c8af3930e4533a09fedaa9b908283c6ef3f19a8824ea69020e2785ce57661ce63e30f5fccbf13ca5b85de881ec608e0a4f2c077f1c72b9b98cf4d4b668d36c06cc8cf3a7bd4ad6dd0791f4f8a07a1451", 0x1000}, {&(0x7f0000001580)="21cf70dff493f59b7148759fb40b4b0019ad79c0f1ebd6da9533b6dc4be9594f83bdc462ea3bdc66d3fb9b4c3ed2eaeb6e618f0d349e081cc89b0bf640cf83d8560715", 0x43}], 0x3, &(0x7f0000001640)={0xc8, 0x18e, 0x8, "64e3c28e1865aa96435ca7554aacb58c878817df68b727566087519728e038967a2227ffa75b587be3a48ff61e4a9d08167c3bc8577cd8fdd79ddd734afb93be688ee8672e91f2a5b712e20518a68fe832e79ce977c3b6785ff7e9446a53bcb339abddf83af690acf4dcc924db98e939b795cb6a7ac63a67cf62c3dce70702a5aefc8e91557cdf0b1530a1946dac8e96cdce335389572de0f9b8a6b2bdc79547cc5d8a7089fc888f2e24a43079c84ba1af72432d57a7"}, 0xc8, 0x800}, {&(0x7f0000001740)={0x27, 0x0, 0x1, 0x7, 0x9, 0x7, "5196408a8190043fb29f8b465cc0fb4f69b00e88b541dde3984d6289592079a277edbde995d6677d0ac7f650fd897bb2dfa1db7e92b549806e5fadc7ebd4a5", 0x3e}, 0x60, &(0x7f0000001900)=[{&(0x7f00000017c0)="b5441db514e59a4ab969f056e6d75b1d7e5cca4071a8522c31a15affe85882eaa241f4b448d4af0a55dec622d58f964a4e572cae14f8610baadced70fc2c7fea37687e8ed29f8a1227d19ce1c7c87b77554b6744b6cb2e21bdd4cba7edd46ca8553b0ce4cceb34a8c6713d86d011d7b2d60455aeda944bd4436300d575f28de751c4afd15512e05f149424a33f779fceb0738b05db6c58dd5dd514cc02549f8a1cfc367fe4d1a6eb15", 0xa9}, {&(0x7f0000001880)}, {&(0x7f00000018c0)="4b7a2041a12989b5540aafed4856f6ef2ab8928d09df9f457e9dc0a6", 0x1c}], 0x3, &(0x7f0000001940)=ANY=[@ANYBLOB="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"], 0x108, 0x801}, {&(0x7f0000001a80)={0x27, 0x0, 0x2, 0x7, 0x2, 0x0, "872f4579d2a2c42b13da5164e99d753bea4d45704cf90f7d44430a7de5e2949098038773a1b43fdcfee91cf7166c4a3b076b03c70dec68a863fc68d8ed9467", 0x1f}, 0x60, &(0x7f0000003e80)=[{&(0x7f0000001b00)="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", 0x1000}, {&(0x7f0000002b00)="05f5d9fe067dab92597f0fd5cae769592d338c5489f958522533b10399fb9136c2f667ef4b37efded8987d02d83b2f053c2df7c2b92a731ce36b27d1cec1973c2e5924c6012c2d34837f8441ada6f8c385a1b1044b171179c20c332ce5d8552e54e64b10bdda824b16c2d6bd16670735c319644d15cc91d8125f8a27a48522e142d8a83f5d048d9fae734d3c7126", 0x8e}, {&(0x7f0000002bc0)="bdae367a9194ee7e3492c4c9b7ed28bc213d23ec773eaadcadda49e220acb436c5c0b7f941115eea53d156886a0618d03ab438ffefb0791d3c", 0x39}, {&(0x7f0000002c00)="444a604f97cca696030c7c3d0884739585dc", 0x12}, {&(0x7f0000002c40)="9ae3b1b3fd3a726cb663507362f39f09d067e9a459b9c6274ae99c7f170cb62a3d398c446eea1807a47a4707e84470f6b4696d3a5254f14942192c43b52bd2425305202a2459b95234cc1cf24fda959079df6c5dd77ac2598d22838fe5ac5dcc1e27c958c23975b8a2289ed969fc37431ffc3024ce6b85523eb0b793578c224e33f220a0f344c09c6d34c9d8425c36b8269753144021768b6726211dd6f1a808f8786273d63784e301aafa68b1ae2688dfa799aa67e4551acfe30bf632fdbbd33f7d9f4124a18eb585cab7", 0xcb}, {&(0x7f0000002d40)="a4650120aa9654f324b040c042de6122b2b03486c1bbfbbef8837459bf651ea6747165020d822a88d9c1ef60796cf58047b2809d8a102c730e2ac348cc65ad9d64ab3ba15f705497", 0x48}, {&(0x7f0000002dc0)="aa79619e9a115d", 0x7}, {&(0x7f0000002e00)="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", 0x1000}, {&(0x7f0000003e00)="d90d8d47871836603f8bd1758366aecc57b5e9a5e1d60b9128497848626a59654c93bf8f803c061dad95357800547290bec8ab8ad7883898a8a4172a5c8147cb7fe33da556d5691d4e", 0x49}], 0x9, &(0x7f0000003f40)={0xc0, 0x112, 0x3, "271084ae107fc11c010c0a972fb47ba8dd3ea3c4698ce8e8a2fe5c390db013224fae1c7f0610447ca2a403e10273549fefc9f5a904d135da42ead8c59117e3c30fa0ad03720c3c2092a7c2c5ce5f9072ea27ee376eab3020ba9e91b35e403d72455a27c2c7577fe5eac6ac8a3b207164373be72f1d1e98005842589e0322b429b66c70b2539e01d2c182d289adc70b5da77545c2a3923a647899d15ba9de4ee274605cd7ef564fd0eb63182e16"}, 0xc0, 0x80}, {&(0x7f0000004000)={0x27, 0x0, 0x2, 0x1, 0xfff, 0x2, "2e10f708ea14de89040c5f54d9eb478f2e0b6d73f49af03922a67f233fd22c99206f10ec6fd021b90d3d1d82f4449d791ce7f857fc11db2c010d3974a95853", 0x15}, 0x60, &(0x7f0000004080), 0x0, &(0x7f00000040c0)={0x58, 0x11f, 0x7ff, "55b4553d4a5bec4a49146f29b46754c488ae09a5484a6c342352fb65f2d25d744885eeb9bfa4f97b802472f362406e62548c2b6ae827d147d0d50719c51f310b87a0487d2d"}, 0x58}, {&(0x7f0000004140)={0x27, 0x0, 0x2, 0x7, 0x101, 0x54, "e2208c7f2b193277822c0910abe3dbc309f7f3516d7daceadb41241b0fc84d5654aa8d4dbb486f0e8dfce7199e3a967b3278f375f8a83aa559db45e4df01b9", 0x2e}, 0x60, &(0x7f00000063c0)=[{&(0x7f00000041c0)="b0e20ca76bdb642bcf269f6ed034de1b106532bc6fcfe76e56162a0f3ccbb6b07d278329719442dacd65ef5d4f3a2956aebb", 0x32}, {&(0x7f0000004200)="1ee1e083b9d6b80480953a47bad5af894f5f0b672cfdc41b145f8394eef9cb7f9acca3b7ca2d52147f8ad17112a7809dfcfb06afb8f912a98d03570b84c8460bbbccae91ab34a01ad1a0e432cbe074140ce6830b5581e82a68733cb11297e5c520d1f27d3ad5fe46c74bc38327ef1faf531ef126655dab14924efe2ba63c8c56b78cdf372634cf1d87841532b9308b19486e73d3ebbf688c77d1a9eed1682bc9c58ab5822e72dfe1e426c2704139a7c9a698ad49906f7071257afdae3bb7a00d58fe0402a13d0306e11b9e9ee877196631e885d86e828c47c3403d0aa0385c78573f7c59e6a945d11fdd9ecdbd3d44b2d7a38b1e00166c54693dd8e8c2ffc416961f2a66b975e7690069394eb7a600d52023ee3fd793c2ff93aea0a7baaf709fc272068a8b6ccff0b435ce94805dc9ed38a809c039be71ef8e9c71cac80eb95bc9fe084023615265f4aa96f98ad284be92d939f18a1f34f94efaae24acdc2f80ade355b724e6bebf7565b9916567d530200c1c3c91aafeb3ae1b0f4b31309568fabf52147961c39de7f0c247b095f64bfab1075f5c9828325ef5e669bee49a74411ab544a9f2d82eaca9dc318f1ae658b761c2172cd54a60afbe49e15a174adbe1086cf311e1f21ec34dae2dfd70dd8529ca56d9414cda602ddc6523f9e204e9485275040487b403c9ef4a4eb6831420814e32cec7635530ac6001b9dc858b9b078230d8da48867ae16525f287fc963f490e13a05e62af8dc2dcae1e2db86050889de8927e3be1a2e0c55e83b4611a4c03ed422d2af93d04ced04634c63dcc99d5a7ff20eb49fb3da53e1a994df1804d9ea4cb6e2f81b18c8e4b5852e58069a2a0725cf3c84223b48e884269f95c657fdfb84b82b4e901d21ef8faa78b30e66ffcc3c4e669e4bf7e3e7f8c21f3b2ce9263006f0a0e8b0a51a13efc4710f7a0b217a842b394fdb3f9d34228b14a32f8a75ac4250bc5911d41a2e85aefc974df062aaadffdec2b1c11ab724271d17ac69df9d22fd250bdf6856cc279556a89c6941109027c0d106a61e4420e1f5485fc4d57bb2660c46d142cd573de1cb6e14cdaaa36d06140a64539566fd142f3834f3133b5ccc1484abaabf5df1360aa280aee3e4d11b4dd626991a8617a9795461e92380e7557140b82a5e31dd0febb11da718b804728d66fca5ce16d9d03720befa43c60c6ff36589d647b7e27dc981208166dc90a85e316eab2f6c89910f9e65589c68eb133868a42b6622f30fc186afb28f2e642d6ee84dab608ed8c7b04551e1f180683fda5dbd34d1bb0495530ac0e97906c41936c60f1fffb3738861a94b5328b519acdd2c8f601f48166d48e7ab3a68bb07c49f1835092a75b7abf569ea4ff1347e671a7ebdeca2dbabe74a266e2c15d4be7a834145add752f0a2aeb60d5c14519685e153643c956caaccc03effa3d670dffcf539d9bc0d6b1a46d379c3a043b6c4efc378b07f5f8a0502b593d5f303aa0a8dda33a687df9a40d11d187ad34b994275201b7c2966d0d8474799a2f66e4ae137adfc90e4c952e6b8682d0315bbfbe4f0f8c2ca077bde3267989fea6f6266d39a048bdd27fc9a070aed92e525225806969e792a3ac8ea5e6c6c85936de26ae21306f682d237cc1b2e55e33b6ff1534136cd02c88a9864e2253b8d1eff3c717266f47a119798b35499747b1faac3c5bda70141ded804a548a1e06833756a5e7456310f67c848a36eb6030f4f9925ed6323032f3566e8ba10306f03d0ea1c3d72d5055666a1c49badcb12670f845c2cc55f5343e65fb1b71761a218b12ed6a88ccfc5bc82f160b7e7cf7fffc9654018c18c46071df3da930a06de216a264af1a693b27539cb2683a1122a620da58026973f99a99c0d53f73fa779b971bbf3dbb1035636c19a7d97b2cd9fa76e786220a0fd7e7f3f6e3bf744b2168ceaadb92901f90b5d266f7e68e251afdd830d9abf22f81ea0268c85edd011ad7e31d909f373547cb50234b0e093c7c0de7eb6eec9c05363bf20e10404dbf6df638a442805d5de9dc9b8869162452945ea8752c538d165dc7e40594f7b212e1a950c8677546e1bd86ffcfe349e46483045b0cfde5571bcbee52addeb3bb3304ca2c1ceb78a1ad21b50ca95f5c171c085b0e5c26a747d5d32c29b385cc93100c5e340789b2035fc155263e613354f890afd7be9d3e04559fc551ca239871530a71b2a221047dd60948b103869923f0f70b8716b6ab958b1127061eca6d26afb38988e237a4e911a70df5763604499de5d7705960d8a61a256ba6356f72864830c8f4b34e9322da627482b3cc9563e282bea2d3e648e18c561bbdc75e9837ba7f575c086a7a54d0d2bc5380626d6beed2a18418d624c78937fe8ee79059927eb6163c4dd01dff16e4004a3ea33fabd4423e28946400cf6cea157d12454d3d9edb93049e9c998c2d5f1a9a63ce356861eb10fca2eee8dfafc8502aac5e8830ab2ddd3a3933ac06878a341b752a9f65a09137812c32208b0e7e4d3db530ad7e6bd4da4a01243dcdb61c7445a23fbb152a57be58e144e48c7374df43a789b5bd72fe14e62d63858368659541d6545a83d284fe6b4501f837ae08fc9f208e279c29e1341928d98ed9e6e1779123688449d8d52482cea404f9df46e673f192a87b63be71ea5dc3e8a4a375ed9bbc40eeee7d482d5e49b4daabe73ad353bf5dfc36d0c49961068200b21cb4aab86f2f99aa5960a032b50bd3ed4d6b6c7c28bfd567e2896abd43569135fceda31835c00c866b782cfdc370db2cd6fdd8f62dfd178acd3c10e80327f4206022bc7b74f9d473579cb4c3de4a8fc80d18628362c2ab368338cf2e8d42251e267b197375ba67c5acb814c8a926d0b13cc27d422cb6775fd397cadbc3ac8f7d75eb1ad5a7cc55ff13c97c4f7655b1542b7d0179da9af2cdf7d4a886bf578ac54afa73af26f06d1a41765a21e412bba14f56b843208a0f8d879cb01b57bea2a6586315a6fe7ca643a585f09140d02063ac120a2b17effb9456360a2b0b80a764bb356c24d425e7a00c12952f889cc83e4468c7b7bf54b241f9eefbcf804e32b1b52fecd7da5880ed2edc4cb017b2188cc343bbc882dc56485ee2e9826a59f5e5945b60e2b22d09724cbafac31d1cfdab5a6893d987a74655b7346ddf4b5692b58f4b808bc2c361f90c8bdee4ce4c0881767bdf84da0d308ef2aff8bd2d589f609bc96ce2e5d02d9a0824bde704b209ae5525090004cf4de67bc2f46299c625e7963d0cbbe66b624ba112bf5e40c37cfc688b682d1bf409f3dba6cd1bec10e1dfb3451865480f0254b908d04a74a8363a8e9a241f0daf2018471eb194549019422b83722d6dc0efb01fbe1ddc4d774ab124a5a1cbd6acfa11187fcff2b57d9dd7802158ac6bd20525ec148eec70f00d1bd89b7813ad89e2599f20f9c3930e2030a3daaa9e0c19d885c5f85a40d17885e1bab2cf0c6501f5aace62f6758aa58bfe6d3bd5de3107262e1d8264b7266e52d42b7ace52755aa96d31bda5578606c0a0214803501a7596c49de492b694260279f0629f3fe9bffa31bea5ede567cffe253521334fb473b789ef93e1adc80045eccb074695a2bb37102372e2013e96e7069bf93d3ec11055b85fa8bfb7d274f3fbe46e333ab9fef53088b2fac38634e3dc1e2407dd26ef67608f8f69ab667bd9eff815c87b28f445868d88365e8d99c65db5a80d9ad97574ccd05ce75aba25425604a9c69ee4e520c348e99ae189ddf5bf9c3e7b48982bab0dda95ce464767d1c955829b32475ea0fdf9949a4e43fab657164c4a9e041aa423d0f941ded54eaf70875b1dca281ca75f227614b1ff741edd44cf58cd890c459a30bff43645ab0938107867ecce2c9c7c6528ae7038ced30e09989fa2775cfab580c6ed2df44e440509e900c3a5cdb78fb299b41305c7d7b8a9dc3979986aad280e0b5504977f5cc169f1e9b62b0abb156cd8154b06bde6d9482ceaf8c2ab2d83cb1d35001d3b41426f2fd2c5e608660cedcc880b0e6429824764faf6fd1af701bc6697c90f8eb55a57fea9e1ea567d5a0f884c960305db74b964f7ae4b568e4dab4a703a1097471c82bea91269275cf08ec5be8021df0cd9931064ac094631c1d50848daa405da5d4b056b963da11f87b3a8b1bb572947850e6de8e4414ab25906cadf0ef77a3544f13a6c584e2433ec42818e966fef90dbf4f9898b8b18ccc61e4052612949254383e59b2f7a831d5e19ffb1a9b4e3828a5a6825d2bfd3518890f4141e6045eaaba981ac4c2c5ab699d67a8a813c147fe8dfb4870cdc7d527c880dd9858b8aa8916a78e99f7b8d147b8b0481dfaa237dcafc3ecf1abd5139d997d0903cba59911254167e5f536c185e417175bc06dedc638a737fed3b7ccc04f180831d3211de1ae5e6a4e3b5f84cb6a7a94cfe990eb4eb7b8b4d5d55a2e06dedf136159749f2a77cfff99a698266b2c08d4caed1f89ee315c0fd6a22bfe0bb984e7c90f514dbf148c64a1eaaff76b974d0cbce0e88e1f88252e39285a402ae171d54183630183f9bd7e810d886d03fe13c286da7bdd7eaecffd446cec2f1034829db48bbb2459584ba976d70abdc15b0b821dc3f1f09c282fe2e335a2591f8f4e846f81185acd70df59b6c305fd14b1d2b435818169c00f8f420b067d17d8693185860cfeb850643fc7fb02884dd74f29cbed9f9aa68ed61c24672abc128443a7f3bc78ab35c8e43632b9d4759ce9f024540c80b8e689baaf3b9f6bc4d2299252e9f6a0b4be3e54c8a3625baf20c7f9da59388e40ac987f61f603d4d62215ac2fdade37df6cf1ddc6541786810b74c45033d3dd27e233ad366f7bc45960532d0f68d69ea133a0d12e885e37289cccd8721598bf51e96225542bd4838a201321f0c9adb5dc4e339f72c34cee803ff123763b3581e12a5d1a49285336667d47b8a52773904efd95aa896113d6d2ab27fc806a9fc28c78bd8a5e966a1b4a16db11df893c6e1197d54c8ee946bd57aad45a0a6a39d21580bbb45f5dadcb6e3b8d715fd393ad34d5a8e3b644d6ed59abdbf0821aec74f60c679ffcc870ac8f54bfbb545fee7221feeebd3fdf1c0f6c9204144ec29efaa0d3eb6f76836ea7199e25e931663a10ef639121c5740e65073e7f813afafdb7f8a33c29ad49713a20d6e948c772a1f138d9c33ffdfbedccb62deac5f43dc5707fbc1cc5cac80ffcaa2ea4f1cd63ff8976490775152c64a285ef547a346b29448c676c58192d5c05f3f8dbd4d0b3e8b9cd3397c09fa2672418559a8dc6c0a34e911af5fc4448a8970c870ec046d794ba110ba21d19d2cefb5cd1a9508d7014832a3d2ef1aa60034fc4de54bcd45979e1104b8d39ff00711a02b5ae282e8c7a24fc312ffa7ab80190fd829c462f5bedace3a97a6922d06b26386239a143e6ae1f8aa38478d0faa1c31c69e05e9e46a697994f64a33973af8b5a40bfbb3d6213e072be170e901314ce687c215298be43a7557e54bac92d4674a43e4ff8ad66f7cb7abf631073d07a7b7cefa7b106b0f7fc6049077bf1984c0977f8261314b5024ca7b7bfdf646526a9df3a7192b9a0a670b638a04308849c7589841ec945d9f4b86ffff3b6b0b4883984af71a7542b0bddf2bacc350b7b790b26bbe2a62e0942395655b2f9b6a3874d562e01ba5894f882ab92f8cc406bdf29a2814b6f041aa4bc9c44b8d87c85a7285bbffea8b9540eb5b6cb1e5d8a08973bdc91a6d6c27d18dbda7270e165c3840b3a25e7aee1cc4246632fc0a2cdc79681d0eeb6028164ddced73", 0x1000}, {&(0x7f0000005200)="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", 0x1000}, {&(0x7f0000006200)="45a2bac737381f0718f146a781012d4247f1c337b961538b3dc6379fdafe3b3a67f94aa3354e339a6cce629dc3a6ebfe067932990a6113f175b26747244ed3ea2554c46644e40745fcfa280454465fce0a85921871ea63c7e0b98c34ead53cf12d9d31eda5ca4fdf6f94136f7152eb0bb0d3b5dff75b40584ae461cdf9a0edafb0589aa339195eac154259d76e736a6b", 0x90}, {&(0x7f00000062c0)="d9be82d6bb741b5b3361c5b8cc9e9f87b10f452b0210325d2666fefcd635f5b57aa7058805efb96daac7020b390d78dec2d580fe1cca4068becb576a3af5e2bdbcb7fb40b1e39761f8238bd1bba30378a11cc0fece4a440ec5bdb4a1d7721db602fe0f3c480b8af8ac8d1dd771344aae68f2d0d97a645bd83e182cbf629213c8f221897fb568e763d02d1ee80c951b33519def84bc5c22c3d965858192e8944cdc57a128468d530c90f75096ae2ccdb9b81597301134117ef4ca7dbff11a849f88c0907fa502", 0xc6}], 0x5, &(0x7f0000006440)={0xf8, 0x10a, 0x7, "25e5ad18622d311246f5f2ffe20a0cabe6adb51d3e3f32c475750db7e9cc6e027d0837c4839eca3ec8a5477c1ca686d0d8e88ae1cd536cf641ac83a0a4b1d02928046b1937df4c2ec30699a04c4b9bd826146bb3f0ce1c1633958efd0cca48eaba925f3deba55342ea6d37589b7e262d6c4d231a4c94a87f8c3e62ebc076fe863145b244d0918915632949590e37a176e1a87b9c3d51134c5806d31876095a37bdae6297eccee03b0d2b066c5454dae524317ec375c310c9f20fa8b7da6eb3002247c349eb3ff5283fdf7cba8a07fd9e618cbb03bdfd216244a594f6a8b17597878b7b"}, 0xf8, 0x20000000}, {&(0x7f0000006540)={0x27, 0x0, 0x0, 0x7, 0x80, 0x8000, "cc0579447870ebde9acc0c10812f59f82cad41fa1a4722eca0ddf66b617413311c66786490faad77ebe6ee8c9c906dd1e10ccab4df2d86dbf658c13da07a8d", 0x4}, 0x60, &(0x7f0000006840)=[{&(0x7f00000065c0)}, {&(0x7f0000006600)="7e3940a375f4db48043e8e691ea13fd0c1a93f46fbeba9214d724ce2d71ce8b036226046caf9385ca56b17f3f7a9b73e8750bc090701265f2bc5eada1bf6", 0x3e}, {&(0x7f0000006640)="e9b1bb0cab8cce9a777a4b54dd080e2b84013c46b452515a78a73d186414e53216b066234e4803de81dc215d499d99982b6afb63f9a6e04c3718b3119b20be02a91a5e605b0548cbc3de17e57c06135fb474a7c4d3878c4b605089fb372b7896d6099e974a6526d6d43784b384a0185dc76d5f4095ff80fa19ac5236613a728c1ea268c934cd0da2733291921417ed440904e22260", 0x95}, {&(0x7f0000006700)="31d4460110a1e1ead47b1094a22ebef5e0b16c4b8daaf17069cc5a3485305d8d427e234c09835be51aef27c1a42e7804d65a2cf5ffdad04a2a20ed5893331b7ac8b40476d68b0b3ec427487dc06f48ec8b3bf12a53398e3706fa48d1abc78cc99badc376984e680eb079c074213905ac5988f173bc4232946e10c627c09c5beab1ab0fd951e9d356163e949b839ff7a49d63157571ff920c5f82fd893d9adcac5e0e1b83480a14971e5cb0aea7c9386a619a42fc6aaa585f788ac3dafd98565b181be5eafef3106d967122095bc0556d866d7b90678b7f537bfb3b1c5abf2936a0c7472c6a5e0fcb5de9b52389803e7523598ccef0eb4270", 0xf8}, {&(0x7f0000006800)="24cdf1ca2e04b7d72588bdc963db91905e24b288386356993d30f80ff9b8924a115ea0c4de4dd3d27b50217f3e462b", 0x2f}], 0x5, &(0x7f00000068c0)={0x1010, 0x116, 0x6, "605e5f6898ad83c84510e7db5b4ff8067e8b243a357a7fd4f8703416788a07a772b728b8422b375b2fdb18d78298251b9a01bbda765887bde48ad94e3e04be853250c5058cc0f4fd19e35d88e93afac16bd51186bb0308a09a781acab11922ab7c965c3a8045a5ed69f0803b325d2235b46ca64df7c29a3f48c35206c43a879164542863b2d407f4fd553cb638e3643f421034966e67cb33ced5636fc2f30d1f946fd3b8d75bac1ace15c386dfa44dbd9503e21e8a655e9eab12c12491ca03f63a36594caeca6acd768ed66a27efafeeeb8a89e08a2a15bd8d0d1b9d542c9b1c7dd7835563e5b1fde989ed51d168a88ee6025729947684769816d186561c687e46aca56b42f14d17938813c6340316f06e03c7289d65bb253b78a179ef733c3c10836e469a09f07706ccb735261a6bf27bedc7bd5a70e92d3be04763652c8a9584675cef5fa7b5150063ae2558c25fa3a0227787aabb38f8d374105388c40a44eb8bc26a19ee1e83694e7d91a03c24616fa3dfdafbef8d9178a4e2ab8f6bec593bafb577f9be4e63dbf587c89e13a39642dd159d85ebdab44e8646b0727b16f8ae52d75c570ac2b6e47ae53cc1abc66435d3046f3b765250b7322a39f7df36591c18016b5b24410bfcb92d456d9bde9b1597e707f47802d42f10d0d3d5d1470e67764d64dd238170d5a9f2069c473c09b2effa8cb0233b1f8456057db95ce7fc0ae13e738454a0bb16605dfef0b52c34dc2f61c9f5c330c23aed14e1b72046861bee32ebf58f2fe929f350c601ac3da018a213cd6b4d9229db5c66f4651f2965ab0e38d91bfa35c87a0eb3c3b487abc8dbaf144ebc7c2091d6903677c9bb13c002ff8b0f342d837e09bb4f6ca280ca89d00fc5f8e598c217f49d64f51ba8e39718985b2105334abc6d907c6443b487875af6892bcf807c33eeb444c6cd5c99d6e608e3a15d79e8f498ab0f30ea6c3c81cdc0d8925f5fab5c2fff449655e45643fb910d84b4e063bc41376d5c961914ebc6c366f82ef56389ce4ec0f27ff42d43ef3dfb99dcfb6d00296bc708b73911891f9b0dbccba9574f463819b4faa967d07985a7d1e85d3e0a3548dce52106197dffecffc8d8e2f34bced884eec9f4ab666b357c10936091a65011583cd1660e3111a5cfbd160a4cbdf74590a4f29dc9ba779bf776b31c4b7cb3c8ad375c0ead0f680237cd50a070cede4c940adf1d05f274811b573f0994b419e9576b7bdfab82c3ca272874ef52bff6aa343fe0dfbcdb0c3f566002d610c8e4abd38b10879b5e85e055b592ef60859db5f4e191cd490ceeb7e6e9d285967c969cda9c882d0039f95d8f8d5c9672bc68a8ff97f4f5b1280d902af1807ee314abac90e5d27a45c6e6da6c09734272dc6124e2fcc88372509a7b3b5fb77d583f7f56175f06238a702104db8085b6b0bb87701c3983cd32c0dcf7f764c78e5f3cca2c75da60c00e9ca37df4e3483baef53c5f81d4c45760369500585aed1aedef05fb1df18aa78fc1fe533c71889634c0b720e52e0e187576a75f09ade0977b2266ea4c2cec2ea77baa7128a89aee3bcfd2b8466793430ab8f1a676bc22f05b872e3c4b85bf0b52e222d54a111b6fcbcfa22eca0e8bc166c770f5b61db7a4d97cb2467136ec1d7fd57d1f0cc1ad9400ec254a9f39aa3aed466cbdba71b0c7b8da945078a9683d9525bb0305a265f3166c0dcc14a4579ced0338846dc3bbe0157b77b814a117bf7e8238d388108a4395d7b10fa2ac8db6115e5e42fb723cbeffe06cdd8926b04f0acd4624a70be033b046f4c41ce5bb9ffa707804a638fa6eaa486796a106a6bf4fff80b48957c472eb8f3b0ec2cbbfb704092eb101a9c3acf7ef2da9bc18edd94326fafcf8874f51a4bc3ec5ee9de6b7eb7ffff9ed186df5965e2c7e299c681fa29511b51bd55638e7c15b7f9f46d653fe210151421106d8f97017af9d676dadc10aa5f06f4f9e153b2a5fb22a14796b72be179fe6de71ac161ce0fa6a9c759af3776c40b2cc270461d1c243eb63d3b5d7f6717596bfdef810b3b5d282fc4758495548a48b0a1221959627295a58c76e300aa6d75a45abfaa8305564379083031eb0cd60ace1b30ea00b26acf8f480d49a8bc28e338ae69b0c7983859bb2342814973eb4f88d619c449c9561be1bf3f95bf9842d0d7a9076af46e3cf60a512bcd8f3ce079202cf6c2a13f0662d95fb58e75d8faaa60ad5a787963bccf39546047deae39bba75eb3688581410a6859b6029dda2355bb004a89024135624f4c070280c83da7a72cf1db11dcf48b8ac6a9adf7e8c0919e363b674b1edd05aff07e4f0a19ef5348b4db4ce36d0988362bfcee4570afd4b5c698c0540257da3b4bc092c711154106e74a66ccd3dc62879b4eb109bd776ed9363a327c8bb0e70d7927b3182689a1d30ae19c8e36bfb3a164052103bfcbe60aefb6da8c3d272ae1a64195052dff1e876b477c94a5f2073c351eaca8fa5837e64868c8a535297e2e512ffaa18aace4fe11fe78831c423be45ec216f8154f825a8541977d8ed0d0a2759881f17fc8acf736ea6e2bd13f873b841ffc011773bcb4ee3e4e8a2cc050844557adb1f3017bb314d6a7f39a6de79814b5762dc2ddf0df633ea16f5369d3656d5a52d700249403be3b5ef85e82f3be094bae1a0112a1374e07a6519b3704e5e6cba9960331660dd564f45afbfb09c19b60bee1e52a09ef83744a4fbe08db0703b02f4de5303849bae0e494306141a8a6ca7892b6afe6d7d640b05984b6663909957812250f34c44cb4a6482485a55462b919c32d3aaab2409a88ae0920963a7c3015cb52b6b0dffc336970875fd872885d6d868f1c5d05a22cb93aa45c9bce95e456137cf584fa569e85d4d963dfbb69beaf61b8d418e2eda2f9a3d04461f069d3676b726e00337c9eab09f024866d1958992c5ef57cf7a6d17d738214b88f7bc60b08e72241d7e5c83f00e4ec4f98819ef059dae64a1a2cc59e302be4190adaa60eea190266d6e937887ab56f5b92950319eb29d10c4d0b293fbd35449d54d9d6cadb0a8a32ce2e00b8e567fe1054ab75417290bda203585dde5807cb345e21e34f6d1b90d168a2fbf9db80c86134cd065e09613aeb389433e325c992b09dbfb95b30c05e4713c9b1529d4e10312ce2b79d60e2b69d6b0fa3ffb5153a25a5c2b1b323b280835f8d8d7de5b79156b2275a75867b376c8778cc877bd8619b24332b148e9bc023444008e98d0706d4371d46fe039adbdebb34990b0195b06158d32cc6c5eb5ab713d48a31306393e5c5f58ae717276878efea572ad8312b162caebe6db72b7d8cd84f137613658940ed9e187ef5611f088a40ae7d642a631a90c88c308b06cfe46c089558ba7257c877dcf19e2439ab6cec2880b5174b9611c12b26f499b3c6c83327795500ecbc701174d5d7e25ec73f210c7c9ad5a5b87265ac492744840c60b6d9f04168b5ef535913a801024b1c6034a7446b5d45642dce8f1fed5e3e053ea963e33c31b8cd50b9e95dc36c537185851b7002edd4430627f88c4d90a248c472cff3fefbb02efbc1168193a85dcc7006d3d7cd3bee92a86a6256a85ac6a38117685d50c7ed2a0a31febbbddb2e82a8098500527e336d3fedcc85692302cf901b7fead12f873b04d401eceff3f0961cf7be5d283a60f9ce62061b5649dde848652353d7b238099dae8a1c44ecd388732ef4f84e1a600157d6d1e43bebeae6196f18c68346d80a1e745f67ede96f1fa2c21f023928fee458224b446d109249eee98ac38ab53bc1f33b29b453538f20be7f1494fce715953bfbd77feebf0490af24e93b7d7fb1f55103f4ac93022ade268d8c78307d5cdefa2e0f22922a14a1e3597c2fbf20cc90f6c2d1a90b073f3a5249d2a3a0618646223a90a438dde6964fb395c4556aebe4a7a19d3a0ede4e444c1cd0ae4c06b6f48d1da455eebf392f2512f2ddb35e045fc76570c0601995b1ec255b5b832a6a9dc7b9eb49fc8e29759661bad79da08e749a229559f64be9a02aafbf7faff659bcd0d795c510a28473f5aa853c32efcbc7bbf5cc8ba1c1714a7fb131badfb013d32dd0c9ae9ad0bcf6ccc337ee7555114438652ddff7c6c7c9a15df813c819073962e191162dc9442633774c40429ccce4aa5dbd325b94890b39c940b59bbbd041fea1e9877b8ec11c090d928ab852606682da0446654fde0d2aefd356afa7d2dc861980253799c20f3a3f12d532a2d51546d72fad56dbd5818e0bda31370ab6de6221f9c632bede077d89b337a48d1df65797007896879525b74c203099fb236e4a53fac47e92eaaefb261d121701e60a5d90b5b56829cba963cc676e2af8c2222e46756e2e9e2ec46b5008979d3bf7bb57a117bea64fffbefab1e1cdc571f3949c82bee2ea9884ae12fa93ae7b5015457de759296d7e6ef48ac9825268217264222e4c64d668750261e81e9272ccea2e152c9c8779b96354f051c39a5cb8b25131f4fa96f2fa8667d52138c9435f540c1d74de811a2e5f612de1d4747aa3968b46b069037c397cc1706d2d2877d3c57df088be2e744f07444afdf5e0a52863b84d64ce40325025f76c43a656ad77b1f140e5716e1e96b974d149415c0e21872d47921b8ccde915b47b18cf64e672dcba098bd64d29c1df9c86821ea01eca2259e23f16ff279b28444a9087ada05be074624f009dc6a961113c879e4d9f63d0e0385cc347df7ccbaf02efec268ef799c8f4ffef70655dc8711e3df3a8f9137219e5f855409c9cd63f6290763738a1669b3639ccbdc128dcd0cae398dfa522549263124d47e8a69d94178d9745a06c8149c9a2eeac8e7c2a6127bd4391cced6aa1d800668905a33f09b6bb29614aeb2d4c73d75ee0e2dc9ab1079490d8cf9d0c34e3a339ef339e92450ba31e1754466b4271033c1ad4fd73fc72b2180cd89ba6e35eba27490f2135d40782ec6b35b67c9c2d7b34b606fa29d74554677e7fa4b114d2e1fb9f3752bcecfc1d9983e8cb06318b04c4771146f45f8dbbde6b10c6c4db6bf31351cbfadde89a191cd7027f20b523f6858c3f059853242df727458338768de264383798b8ab404f5cc0f0648927b767fa2a13b50e59aadd21233135c5fbeafec6223f436535fad175a8361719c9b0f660ebd831b28d7b92c110325c0fa0ff20fe4b50abd7d7f6d805afe19b3ca23318d7a561a45001508eebc24e629eaf804f010d3aad4085b12054d0cdb498c252ffbf1cc9056229bba878fed33e7fb9df22ba3989678abdab9b330c38d4e28a2c3cdca76d92832d0e8df58638d6aa9d60cd68128359ffd5d491449ac9c2b9bc1feb41a10272763625db1d3923e817ae91180237b09d61fef88e2daacdc3a0ce89b17305cd86b3eacec08204278f564ce1f40830a09e0874bcaae4463ee634b5541a218790d33f28e69ff9b1ff66377e19f236b7ec64fcf496da74949ef774795c0f5072dee11d89f4819b5af28791d0b9d2e4b813396979727a3207960dffdf87c13befe41eefebc81981846268610c08c7e5987700760d2df330717c12d071efffcec4e4c1bd045f8525a513c28b74ff0660b7223d5352f14cb56ab9d83b93af7fcf766b031e5ec3b4d94df43fce8ebab8405bb9af34c4ca21dfa1a039d9b5f39be07b52664845a1447ae83e9d77559c6974b54dfb36aabaa5d395f2ba1064304f69f68eadbb179318230178247491cc76644744317c3ce15f4c582441349b75e008e5145b4e69939956ed47da089461c3a0a6a46fdbcf8decd7e64a92c1c7501e0eed2e148"}, 0x1010, 0x14}, {&(0x7f0000007900)={0x27, 0x0, 0x0, 0x4, 0xaa3, 0x8, "e48f439400c576b57ae87d59bce19a78e15842608c91cd57e4a05ff0798e73550d552de5ad95bc29b1307dac1f78a04e4e08403932d94f28e54149e1f53aa2", 0x19}, 0x60, &(0x7f0000007a80)=[{&(0x7f0000007980)="d7d0d43bc5626099cea42dcf920846c2096fe20126fe6a08fd4168265a1feb9c0390920396d1f650e098f751b94188d6c3cb0679b42020dbfeac8e6f1d741273a4e3f2da6f46c837b3fba7e741ee6699e0c8729966812089169a0b3315ca493cf337c37e7f8f0b610e6c7818b933d4ca66b27d55a5e2f96940b03ce3029825c9f08fa04c6a59fc23a5424c13e6b0e49278cea5d736310ccf5203294c83082372dfa6f1c7b6f718faba1e97eb11c75932f0ced21c90c2f17901aa37cfb8668eb140534c0769916c7ea0e9618de6d6c1e99769cea39924d137c55b", 0xda}], 0x1, &(0x7f0000007ac0)={0x58, 0x117, 0x7, "913002d75e422b3eb19fade19fe96effa4b114797394630899b13ea74afa9b97d892de56db4d706d77b27619eef1758bdab7d9415c1b133cdc5aa1968621a05f4905f5"}, 0x58, 0x20000000}], 0x9, 0x1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/snapshot\x00', 0x320c0, 0x0) getgroups(0x6, &(0x7f0000001880)=[0xee00, 0xee01, 0xee00, 0x0, 0xee01, 0x0]) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x4e23, 0x3, @mcast1, 0x62}, 0x1c) [ 768.495028][ T25] audit: type=1800 audit(1555438205.548:167): pid=1172 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17488 res=0 [ 768.529545][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 768.529598][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000100)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x4400, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={0x40000, @bcast, @rose={'rose', 0x0}, 0x4, 'syz1\x00', @default, 0x5, 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/183, 0xb7) 18:10:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 768.533506][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 768.547549][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 768.583494][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 768.589315][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:10:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x10f) 18:10:05 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x620140, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x78) signalfd(r0, &(0x7f00000001c0)={0x3}, 0x8) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000), &(0x7f0000000180)=0x2) 18:10:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1b3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 768.717638][ T1425] QAT: Invalid ioctl 18:10:05 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) 18:10:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1b4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 768.838612][ T1425] QAT: Invalid ioctl [ 768.906218][ T1607] QAT: Invalid ioctl 18:10:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:06 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x101200, 0x0) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f0000000040)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) finit_module(r0, &(0x7f0000000180)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00', 0x1) fallocate(r1, 0x2, 0x0, 0x8002) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x1}) lseek(r0, 0x0, 0x3) [ 769.012901][ T25] audit: type=1800 audit(1555438206.058:168): pid=1424 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17487 res=0 18:10:06 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000780)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1b5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:06 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xc7c1, 0x180) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x400000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r2, 0x94, "33daf8", "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"}}, 0x110) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x3, 'lc\x00', 0x1, 0x6, 0x45}, {@broadcast, 0x4e23, 0x4, 0x1246, 0x194bbfe3, 0x1}}, 0x44) 18:10:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x140, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:06 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000040)={0xff, @multicast2, 0x4e20, 0x0, 'nq\x00', 0x20, 0x20, 0x49}, 0x2c) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fchmodat(r1, &(0x7f0000000180)='./file0\x00', 0x12) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x4, 0x200) 18:10:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x13f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1b6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 769.385012][ T1984] overlayfs: filesystem on './file0' not supported as upperdir 18:10:06 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8080, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:06 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x141, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1b7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:06 executing program 5: openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x20000) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x200}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r2}, &(0x7f0000000240)=0x8) poll(&(0x7f0000000000)=[{r1, 0x1000}, {r1, 0x80}, {r1, 0x8}, {r1}], 0x4, 0x7) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x4) fallocate(r3, 0x0, 0x0, 0x9) fallocate(r1, 0x20, 0x40, 0x101) fallocate(r1, 0x0, 0x0, 0x10ffff) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r3}) lseek(r1, 0x0, 0x3) 18:10:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x140, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0xc02, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x80) getuid() r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r3, 0x81785501, &(0x7f0000000080)=""/104) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) 18:10:06 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@un=@abs={0x1, 0x0, 0x4e23}, 0x80) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x500, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x12, "7301ab569041ea080bbebb0d3bc61009afe4"}, &(0x7f00000000c0)=0x1a) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={r3, 0x8, 0x30}, 0xc) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000000)) 18:10:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000180)="4ab91328db5973e6be3a5fb6a45529a24da6fdc21e597dfb87383d2ab8d1173b6fd4be977119ab859e5404b3990f5f962c79a94924a5274b7af4ad8bc78902ad6c7f8c49f2e9ed7c800774f192824a46ec3e1f1b8dc980c4013e4ddd23879c2a0f5abe48967fafa79c93dcea8f7b638121062dde183cfac7ca8bc592570122ba86bed355c247a7b2efa2d33b98850511ed0ebdf6328a46f63dbb7081e50b6950fbeb2522f3a6454db02bfa3ec2720ca4cc83a7b3d61da07e58ba17a2f1b922bdf99e1a916267ab720911339bf33df4c53cd1c99808507d7f19", 0xd9) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r2, 0x1, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x200}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc004}, 0xbce3aded3aeb4d4f) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x6, 0x3, 0x3}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x142, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x4, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1b8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x141, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x2, 0x201) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffffffffffffffee, 0x8040) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb, 0x77, 0x1}, 0xb) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1b9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x143, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 770.222688][ T25] audit: type=1800 audit(1555438207.268:169): pid=2372 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16593 res=0 18:10:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) 18:10:07 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x200, 0x7, 0x7}) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0xa0028) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x12, 0x80, 0x10000010fffc) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000180)=""/247) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) fcntl$getown(r0, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x4, 0x3) 18:10:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x142, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ba, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x8001}, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:07 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) tee(r0, r1, 0x7f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_VL_CLR(r3, 0x7014) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={0x1, @default, @rose={'rose', 0x0}, 0x66, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1ff, 0x5, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000200)=0x0) sched_getparam(r4, &(0x7f00000000c0)) 18:10:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x9, {{0xa, 0x4e20, 0x2cab, @rand_addr="63b1fdb982317b714656c5843e95b501", 0xffffffffffffffe1}}}, 0x88) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x144, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0xa8000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r2, r3}) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f0000000080)={'vcan0\x00', {0x2, 0x4e24, @rand_addr=0x800}}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) utimensat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}}, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast, 0x4e20, 0x401, 0x4e23, 0x0, 0xa, 0x80, 0x80, 0x73, r2, r3}, {0x159, 0x0, 0x1, 0x80000001, 0x9, 0x0, 0xc9a, 0x1}, {0x2, 0x80000001, 0xffffffffffffcf6b, 0x6}, 0x2, 0x6e6bb6, 0x3, 0x1, 0x2, 0x2}, {{@in=@multicast1, 0x4d4, 0xff}, 0x2, @in6=@rand_addr="0959579e3c4f7054ee0196bb5a37fe43", 0x3503, 0x4, 0x1, 0x4, 0xfffffffffffffff7, 0x95, 0x81}}, 0xe8) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x143, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1bb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 770.693729][ T25] audit: type=1800 audit(1555438207.718:170): pid=2861 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16707 res=0 18:10:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x20, 0x0, 0x6) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0}) lseek(r0, 0x0, 0x3) 18:10:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 18:10:07 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x12) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup2(r1, r1) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000100)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}) dup2(r1, r0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x145, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:08 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000100)={0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x8, 0x9, 0x8}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r1, 0x9, 0x11}, 0x8) getsockopt$inet_dccp_int(r0, 0x21, 0x200000000000000b, &(0x7f0000000180), &(0x7f00000002c0)=0x4) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1bc, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x144, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x9, 0x0, 0x6) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x1, 0x0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000040)) 18:10:08 executing program 2: syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x9, &(0x7f0000000780)=[{&(0x7f0000000180)="f0bffaf48c351f703bb67bb6cd2f05f8f6d4a0ae56b1b9861fd96ed80a019dd638cf1575cef4e617894cb53a5d911d8abb48ffb19b3857b04cd0274f71dfac52606619098ccc03ad6bfc6767542bee90a4374d4f3bdee8ddac8e3a0134c03ce8b1014dc8ac85266e47ed447192df07813ac26bd0d8c87185c37f4f162f215c868a91a93956821db3fcab38ae0ac1", 0x8e, 0x7}, {&(0x7f0000000100)="e3d724acd5cba555eab38982bac5361f2b8812e014d1bd9da19cc2627f154b1662", 0x21, 0x3}, {&(0x7f0000000240)="3665f7ea2b5c13e33686271e85d25b6e8b72ec066d1172497687327b63a5befbd1fadbb71426ed133574a090f771d010eca6eac2d6221f40e69d6c0dd5b16981e92aef20c5ad7299c23abf4304528a791e72fbe081293cef8608764b0da629f3a4b622161b365f5839248e2a62e89b08160210e09227b4b21d643a058be27195958f606c70498294dc5d35c6dc13568716ba2daeee3f79e66f7eb6c6c2896a4ca466f6792a", 0xa5, 0x1000}, {&(0x7f0000000300)="6c3fd66000652c6d1ed7e768d96d05d4f61baad38696067aec87ab14eb457d91b9204f21a506e2c136761a87ba19c8e1f5ce14f1c6c844c7b01a006b91eb2b7527e5d02af7eaf529105b6aa9f52f56478dfc02c1063dde0ce4c5a4421f91111be0df14edb5076321e51c814c0717", 0x6e, 0x401}, {&(0x7f0000000380)="00e175794ff04105c2ce52ab8739cb1e14b4d2598e3b56f2920248485b7d04134720838559f84075287c", 0x2a, 0x3}, {&(0x7f00000003c0)="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", 0xfe, 0x7}, {&(0x7f00000004c0)="ef0999ceb3646bf9cb31d9e2c744c222e11a64df16545fb36aa7938a963bd633c3a24c90ee91035bbb783d78e417ea3cd4d0d518c2275ee66c54c9025524d042ef8ca169289a8fd3ce8ef33a17c1a7e2363b192f09cb97862c16e5d252b87c2ac7136b6cfc5075b378017a30d81563e4bd9ecfb99070ec8d2bf72e545877f8047d0894d5c71699a20018184df28115223dcfc4541953f950714b99d2be81318db540eb7cda87b31ebf46", 0xaa, 0x7}, {&(0x7f0000000580)="8d916c8148221d08665695bdfe5b46f6b66ae384418a190342943690c1216f832f9a489a24e0a15a09e81392eef44e1194453fdeb086bdebf718292230dd89273c3390e7e3fd20001ca1b09e894f9bc596b6ad3165eb479c09fe2502c5714ebb0ae978e3a01a725ced16f663144cdae4a018f668a85727de6a890804e62b173886719e3c76cacf7acf2d10d27352402f66d21d601da462fab3754d87ae1d10b81808a0dd3639649acd1fb1d41a1defeba7c6faa2b6c82ea76d3698770a1879b85c300294a0f7c703ddb01d7a84f2c1e8c575502db5061e37ed66b6b88e92d33c654704757a207923a16d9f3491b3ffb0", 0xf0, 0x1}, {&(0x7f0000000680)="f9541649d89d3b9ecf2f9785ce76e37e3898e54783f02497d9a107ff492ee1f298aba16952bcf0816937e8f11cb9d15aafbb59b916eb22dddc503232143da7edc14757eb8e5ae2abd041ca66fb824684d37efaa72d0149fdaf55e71bb1a0bff658bef23732777a320e8d6f23b2b462b3f04beeab5b2ccc0f2fe356ecb37e186124f9657d30985dfe2a556ad7b65d4f878fed8b4e55a2e2f224e39e2ba47181be60cf020c6b3ee2a169df9677026adba27c5a12f89f44580c1a51e6bc054830059573b0e6f6973dff0a5087dd4f016a33d53bf7cdd34d3edc1c04ed1f9398fcb23f41569434", 0xe5, 0x7fffffff}], 0x10, &(0x7f0000000880)='/dev/loop#\x00') r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000008c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000a00)={r2, @loopback, @dev={0xac, 0x14, 0x14, 0x29}}, 0xc) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x8000, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xa827, 0x10401) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:10:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x146, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1bd, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) [ 771.280345][ T25] audit: type=1800 audit(1555438208.328:171): pid=3340 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16737 res=0 18:10:08 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) dup(r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x4) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) 18:10:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40200, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000040)={0x18, 0xf, 0x2, {{0x0, 0x3, 0x6}, 0x20}}, 0x18) 18:10:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x145, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x147, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1be, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:08 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x84280) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000100)={{0x90000000000, 0xac5d, 0x5a97, 0x9, 0x9, 0xce73}, 0x7, 0x7fffffff, 0x5}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) 18:10:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) 18:10:08 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0xa9, "90bfeb1f49eab9972a7c1d144847592283def926d1469b7ef77da258319c4942249d43d9a10cfd5dcdec010fd2b711d8eda3110e26f9a56b72d44faddedccb962ba472f85714d091f8c43e28b829ba2ff510eb4de9bdadc477d6f29f0ef72f52ce1d2b1623f41edce5ecfa86921c4ed5a561fd87cd2c81f8d02ce8f8975a9602e84ed8a6d9aa102e8b9e609ee6fe5a47f3cb281549a1cc568521037cadb640815993d9e9d9e816fe83"}, &(0x7f00000000c0)=0xcd) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_mems\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x20, 0x0, 0x10ffff) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x20000, 0x0) pwrite64(r2, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) lseek(r1, 0x0, 0x3) 18:10:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x146, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:08 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x200) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x10, &(0x7f0000000080)={[{@default_permissions='default_permissions'}, {@nfs_export_on='nfs_export=on'}, {@xino_auto='xino=auto'}, {@workdir={'workdir', 0x3d, './file0'}}], [{@pcr={'pcr', 0x3d, 0x21}}, {@obj_role={'obj_role', 0x3d, '/dev/loop#\x00'}}]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) 18:10:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1bf, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x148, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x30, 0x0, 0xb) fallocate(r0, 0x0, 0x80000001, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x10000000000, 0x0) 18:10:09 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80000, 0x0) 18:10:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x147, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 18:10:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000180)=""/77) fallocate(r0, 0x0, 0x7, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1c0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x149, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 772.183489][ C1] net_ratelimit: 12 callbacks suppressed [ 772.183497][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 772.190550][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x2, 0x5) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:09 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x148, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000180)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:09 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x0, 0x4, 0x8}, 0x52}}, 0x18) 18:10:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x106, 0x40) ioctl$PPPIOCDISCONN(r1, 0x7439) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) socket$isdn(0x22, 0x3, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1c1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:09 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x8000, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) 18:10:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 772.663746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 772.664459][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 772.670389][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 772.676389][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 18:10:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x149, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 772.743497][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 772.750175][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:10:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1c2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) fallocate(r1, 0x0, 0x0, 0x9) getsockname$unix(r0, &(0x7f0000000180), &(0x7f0000000000)=0x6e) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x100000001, 0x3) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 18:10:09 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, r3, 0x1000) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:10 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x44801) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1c3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000180)={{{@in=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000080)=0xe8) r2 = geteuid() fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$cec(&(0x7f0000000f80)='/dev/cec#\x00', 0x2, 0x2) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001000)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r6, &(0x7f0000001100)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x44, r7, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x81}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8b5c}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x1}, [{0x2, 0x5, r1}, {0x2, 0x4, r2}, {0x2, 0x7, r3}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x6, r5}], {}, {0x20, 0x4}}, 0x4c, 0x2) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x800, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r8, 0xc0845657, &(0x7f00000004c0)={0x0, @bt={0x6, 0x1, 0x0, 0x1, 0x2, 0xfffffffffffffffa, 0x0, 0x5, 0x100, 0x1000, 0x6, 0x2, 0x40, 0x2, 0x1, 0x4}}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) r9 = syz_open_dev$sndpcmp(&(0x7f0000000680)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff9, 0x202) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x1f, 0x5228, 0x0, 0x2, 0x1}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r9, 0x84, 0x77, &(0x7f0000000740)={r10, 0x1, 0x2, [0x100000000, 0x5]}, &(0x7f0000000780)=0xc) [ 773.143519][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 773.149973][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:10 executing program 3: ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000240)) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x6, 0xe000) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x1f, {{0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x14000000000}}}, 0x88) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bind$tipc(r1, &(0x7f0000000040)=@name={0x1e, 0x2, 0x1, {{0x42, 0x4}}}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="01000000e4537b8705a5dfe4c10b99000100000000001dfe9080f113caee18bf0959f3a1a02332be793d191af73b17d0129b633f09b349047a101b5004c09017351348d968c59db3aa"], &(0x7f0000000340)=0x5a) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000380)={r2, 0x3}, &(0x7f00000003c0)=0x8) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000080)=""/40) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 773.263956][ T25] audit: type=1800 audit(1555438210.318:172): pid=4513 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17153 res=0 18:10:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1c4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x204080, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000040)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) sendto$llc(r1, &(0x7f0000000080)="b9226b507c51114e962ba85e934ab3338ab34891747ba7ad70ad20fbeed7d9b27e8fcd06c48790cc1cfb420b010fa1fb5c6e18c150d9492763d5ca8622fb12a3109c0e42f4772b584ad945be970c7a1a", 0x50, 0x4008800, &(0x7f0000000100)={0x1a, 0x33e, 0x8001, 0x100, 0x10000, 0x7, @random="55e21e9283ae"}, 0x10) 18:10:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x4, 0xf0f, 0x20, 0x1, 0xfffffffffffffff8}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e24, @rand_addr=0x800}}, 0x9, 0x3, 0x3, 0x3, 0x100}, &(0x7f0000000280)=0x98) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000180)=0x4) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1c5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:11 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200101, 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000180)={[], 0x400, 0x7, 0x7, 0x0, 0x653, 0x1004, 0xf002, [], 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400080, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000040)=0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 18:10:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1c6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 18:10:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 774.101992][ T25] audit: type=1800 audit(1555438211.148:173): pid=4960 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16609 res=0 18:10:11 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0xfffffffffffffffe, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2001, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x0, 0x70bd26, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4) ioctl$NBD_DO_IT(r1, 0xab03) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000009, 0x110, r1, 0x0) 18:10:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f00000001c0)=0xab) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000140)='io.bfq.weight\x00', 0x2, 0x0) writev(r3, &(0x7f0000000700)=[{&(0x7f0000000000)='0', 0x1}], 0x1) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) lseek(r0, 0x0, 0x3) 18:10:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1c7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:11 executing program 3: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x400000, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000380)) get_thread_area(&(0x7f0000000000)={0x8, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x6, 0x9009, 0x573b, 0x658, 0x7, 0x2}) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xffffffffffffff03, 0x24000) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) sched_rr_get_interval(r3, &(0x7f0000000200)) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) open_by_handle_at(r1, &(0x7f00000003c0)={0xd0, 0x200, "10573de783af6fb39edb052adda775d0385fdc4faf596e3147a27b3cd8fa562798ccfd1463de8a4b6dba1b1bc2e15ebac25eaa24ae381acc3f78dde54743c10a525662b63c488c194b2fdce5e8f681655f2cd395326c8371f02d5c57e3ed7477078aa309099c717a50e0f4c609cf117fc87251368ede6d70d0aa4e00c9efa024c5adef7f14f6517c543a0db4d72f51cfb173028fb9d02adb8616ed1a285171ba712f6499adc02095175f35c48d96177f95cf3c2bfce3f4f643d041c1bb9b7a88d3aabd480fdda27a"}, 0x40000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, 0x0, 0xbf6, &(0x7f00000000c0)='bond0\x00', 0x80000000, 0x3, 0x4}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@remote={[], 0x2}, 0xb, 'gretap0\x00'}) 18:10:11 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r1, &(0x7f0000000040)="e9ebeb934f95be94c7d30c0b53813b670fac604dd72ccdcaa020e1ce87c8ea2e99f7cac625107740915e2d5d8cb8cc5ba96ae7714d9eff4ed71bb8a64b81a3af63cfaac5810800b9fe1ef7f70864b9ef2f82eb6b8ab449522859792977982e31a801b7bfb8cd89", &(0x7f00000000c0)=""/68}, 0x18) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 774.328113][ T25] audit: type=1400 audit(1555438211.378:174): avc: denied { map } for pid=5200 comm="syz-executor.2" path="/dev/sequencer2" dev="devtmpfs" ino=17666 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 18:10:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x3, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:10:11 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/227, 0xe3}, {&(0x7f0000000180)=""/90, 0x5a}], 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1c8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x2000) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000040)={0x5, 0x1, [0x6, 0x8001, 0x80, 0x80000001, 0x9], 0xc4}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) r3 = getpgrp(0xffffffffffffffff) kcmp(r2, r3, 0x7, r1, r0) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000180), 0xffffffffffffff5c) lseek(r0, 0x0, 0x3) 18:10:11 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0x3, 0x2, 0x9, 0xc0ec, 0x0, 0x10000, 0x20000, 0x3, 0x2, 0x3, 0x9, 0x7fff, 0x5, 0x6e0, 0x8, 0x0, 0x3, 0x291, 0x1, 0xffffffff, 0x9, 0x1, 0x47, 0x7, 0x4, 0x3, 0x6, 0x20, 0x9, 0x40, 0x81, 0x4, 0x223000000000, 0x6, 0x1, 0x7, 0x0, 0x9, 0x0, @perf_config_ext={0x2, 0xff}, 0x0, 0x3, 0x2, 0x9, 0x2, 0x5, 0x7fffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x150, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000300), &(0x7f0000000340)=0x14) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) write$binfmt_elf64(r3, 0x0, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x300000a, 0x8013, r3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/21, 0x3c000, 0x800}, 0x18) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1c9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000340)="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", 0x191, 0x10400000) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000100)={0x18}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) 18:10:12 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x8, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x9}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f00000001c0)={0x3, 0x6e6d, 0x6, 'queue0\x00', 0x7f}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x180) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x14f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:12 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f00000000c0)=0x80000000) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x151, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ca, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:12 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) setsockopt$ax25_int(r1, 0x101, 0x5, &(0x7f0000000080)=0x1, 0x4) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x5, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x100, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x150, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x152, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x365, 0x10400) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80020000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x78, r2, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffffffffff80}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffff7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x4}]}, 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x840) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6425, 0x400000) 18:10:12 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 775.583513][ T25] audit: type=1800 audit(1555438212.628:175): pid=5866 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17345 res=0 18:10:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x149200, 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) sendto$rose(r2, &(0x7f0000000180)="d939ffb91c97e4d3fa7f7dab6603c6bbfba679a923d83d016e04da5d99f8c3f2e63602d46073472fd6f0ec54f2be795d1f3d5870ce79b37cd948f00a5d03215569053d06", 0x44, 0x4044801, &(0x7f0000000200)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1cb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:12 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000040)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x153, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 18:10:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x151, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:13 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x44000) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000300)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/49, 0x31}, {&(0x7f0000000100)=""/37, 0x25}, {&(0x7f0000000180)=""/39, 0x27}], 0x3, &(0x7f0000000200)=""/93, 0x5d}, 0x12002) r1 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x10, 0x400000000000000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) 18:10:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1cc, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x5, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) dup2(0xffffffffffffff9c, r0) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x8, 0x80000) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x800, 0x2c000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x101000, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x301480, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="757365722e6c6f3d00c848accc326866a72f0b0a10cce4559fe9f82e1e61ec8c909fc85bc27f5421567362cd4285bc5eab174ead0f9f47451d9cc12e1210b8b84509b9d285ea9214459191dd5a2308c92eea6258880e15f9bf9e2b6fc87ebd633125575178e1f8e1f2d35e54570ca24fe2e40199246be3d68921ac4f8a6bad1ce23e788816ed0c1d"], &(0x7f0000000080)=""/34, 0x22) 18:10:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1cd, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:13 executing program 3: r0 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x1, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x400, 0x0) r2 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x100000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_none='cache=none'}, {@cachetag={'cachetag', 0x3d, '%\\em1+wlan1'}}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@access_user='access=user'}], [{@fowner_gt={'fowner>', r3}}]}}) getegid() r4 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) prctl$PR_SET_FPEMU(0xa, 0x3) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000440)={0x0, 0x6, 0x6, 0x8}) r5 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x42080) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 776.071518][ T25] audit: type=1800 audit(1555438213.118:176): pid=6321 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16930 res=0 18:10:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x154, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x152, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x4000, 0x0, 0xfff) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000000)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0xeaba, 0xffff, 0x80000001, 0x1000, 0xfffffffffffffffe}) 18:10:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 18:10:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ce, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x155, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000040)={0x0, 0x1, 0x5d3b, 0xca}) 18:10:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x200, @dev={0xfe, 0x80, [], 0x12}, 0xd48}, @in6={0xa, 0x4e22, 0x1, @remote, 0x80000001}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2a}}, @in6={0xa, 0x4e24, 0x8000, @mcast2, 0x3ff}], 0x74) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)=0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x153, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:13 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x20, 0x4) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = dup3(r0, r0, 0x400000000080000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @local}}, 0x9, 0x3, 0x0, 0xffffffffffff8001, 0x1}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2, 0x100000001}, &(0x7f0000000180)=0x8) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) 18:10:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1cf, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x156, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x270) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = dup3(r0, r0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x6) 18:10:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x154, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:13 executing program 3: lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000008, 0x40013, r1, 0x10000000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000000)) rt_sigpending(&(0x7f0000000040), 0x8) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xff, 0x101000) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 18:10:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) socket$can_raw(0x1d, 0x3, 0x1) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000000)={0x8, 0x401}) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x5, 0x7, 0x4, 0x820, {0x77359400}, {0x3, 0x8, 0x2, 0xffffffff, 0x7, 0x1, "82038146"}, 0xfffffffffffffff7, 0x7, @fd=r1, 0x4}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8000000000000, 0x9}) lseek(r0, 0x200, 0x3) 18:10:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1d0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x157, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0xa7c, 0x0) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x28) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000240)=0x1, 0x4) eventfd(0x8) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000180)={'bcsh0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="03000000cd7644ba54e616c63736f2c1973ba49eea66a479ed2772d07881b860f41f4d93250b64a41f28e430726d53ad0439053b7d6e86a03f15e1c0218481334ef5f1ed13b42dc49d04b2f933518e54f8ad2bf8c89f586df03ca49a1a2ac6b02ef1a382c20c1a3c3b362dae7d7c9d357c7bb58f597331c07fa68ed71993ee95292c1ab5a2f7bcc57ba07c6079104beb62614af048bd5e421e0c5dc260bcdf9622a8a70200000000100000070000000101000001000000000000000000000000000000003d57a69f704575"]}) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f00000001c0)) 18:10:14 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @initdev}, &(0x7f0000000100)=0x10, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x3, 0x1, 0x200, 0x0, 0x401}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r1, 0x7, 0x1}, &(0x7f0000000240)=0x8) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000040)) 18:10:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) renameat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$setsig(r0, 0xa, 0x7) 18:10:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x155, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1d1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendmsg$can_raw(r1, &(0x7f0000000100)={&(0x7f0000000040), 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=@can={{0x3, 0x90e1, 0xfffffffffffffff7, 0x6}, 0x7, 0x3, 0x0, 0x0, "2984c962ddff9447"}, 0x10}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000) 18:10:14 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 777.303488][ C1] net_ratelimit: 18 callbacks suppressed [ 777.303495][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 777.315045][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x158, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x24c00, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000040)={0x800100f, 0x100000001, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r2 = getpgrp(0xffffffffffffffff) ptrace$setregs(0xd, r2, 0x2, &(0x7f0000000080)="1bcb0f5e7616f8eac24bc3c40d95") 18:10:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x156, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:14 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x2) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000)=0x1, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1d2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1f, 0x1) connect$bt_sco(r1, &(0x7f0000000100)={0x1f, {0x80000000, 0x6, 0x0, 0x8, 0x3397, 0xfffffffffffffffc}}, 0x8) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x40, 0x800) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000080)={0x0, 0x0, 0x2, &(0x7f0000000040)=0x2}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x159, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:14 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xe2, 0x420200) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f00000000c0)=0x1) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x80) 18:10:14 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x84) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x5, 0x9, 0x5, 0xffff, 0x6, 0x2, 0x80000000, 0x80000001, 0x1, 0x4, 0x10000, 0x1}) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x10000, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000100)) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000080)={0x29}) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f00000000c0)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x157, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:14 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x9, 0xe, 0x4, 0x20000044, {0x0, 0x7530}, {0x2, 0x9, 0x663, 0x8, 0x9, 0xffffffffffffffff, "aed15468"}, 0x401, 0x1, @fd, 0x4}) ioctl$VIDIOC_EXPBUF(0xffffffffffffff9c, 0xc0405610, &(0x7f0000000100)={0x3, 0x10001, 0x6, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x10200, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000240), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000080)={0x61, 0x5}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1d3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000c0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000580)={"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"}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r2 = shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) shmdt(r2) 18:10:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='\x00', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x5, 0x8000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f00000000c0)=""/50) personality(0x410000e) r1 = dup(r0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000100)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x3, 0x7, 0x100, 0x400, 0x0, 0x3ff, 0x80, 0x0, 0x0, 0x8000, 0x8000, 0x1, 0x769, 0x7fffffff, 0x28, 0x6, 0xfffffffffffffc00, 0x8000, 0x4, 0x7ff, 0xf5, 0x1, 0x5, 0x7, 0x5, 0x2, 0x40, 0x1f, 0x2, 0x2, 0x9, 0xfffffffffffff6e7, 0x9, 0x867, 0x8, 0x10001, 0x0, 0x51, 0x7, @perf_config_ext={0x35, 0xffffffffffff6697}, 0x8100, 0x1, 0x6, 0x5, 0xc0, 0x5c11, 0xfe}, r2, 0xf, 0xffffffffffffffff, 0x1) syncfs(r0) pidfd_send_signal(r1, 0x21, &(0x7f0000000180)={0xa, 0x80, 0x3ff}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x26001, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0xc6) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000080)=0x3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 18:10:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x158, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:15 executing program 2: r0 = dup(0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x80000000, {0x6, 0x9, 0x3, 0x6, 0x4, 0x81}, 0x1, 0x4}, 0xe) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1d4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x400002, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7fbc) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000040)={0x8001, {0x80000001, 0x7, 0x8, 0x8000, 0x7fff, 0xe38}}) 18:10:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x90003) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x204001, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0xd237}, {0xa, 0x4e21, 0x400, @ipv4={[], [], @rand_addr=0x4}, 0x81}, 0xffff, [0x1ff, 0x2, 0x8001, 0x80, 0x7, 0x7, 0xff, 0x5]}, 0x5c) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) write$P9_RLOCK(r1, &(0x7f00000000c0)={0x8, 0x35, 0x1, 0x3}, 0x8) [ 778.423484][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 778.429314][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000300)=0x5, &(0x7f0000000340)=0x4) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000040)=0x2) sendmsg$nl_crypto(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40001000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@getstat={0xe0, 0x15, 0x1, 0x70bd27, 0x25dfdbff, {{'gcm-aes-ce\x00'}, [], [], 0x2400, 0x400}, [""]}, 0xe0}, 0x1, 0x0, 0x0, 0x8854}, 0x4050) 18:10:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x159, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 778.484977][ T25] audit: type=1800 audit(1555438215.538:177): pid=7974 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17510 res=0 18:10:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r1, 0x0, 0x1f, 0x5) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x200000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x0, 0x0, 0x1}) lseek(r0, 0x0, 0x3) 18:10:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1d5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) sendfile(r0, r0, &(0x7f0000001180), 0x5) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)=']cgroup\x00', 0x8, 0x1) r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x96, 0x20000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x420503, 0x0) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000240)=0x482, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001100)={'team0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000001140)={@rand_addr="abc516691ff63a3e1b7f9105fac33344", r4}, 0x14) r5 = fcntl$getown(r0, 0x9) process_vm_writev(r5, &(0x7f0000000b40)=[{&(0x7f0000000680)=""/236, 0xec}, {&(0x7f0000000780)=""/253, 0xfd}, {&(0x7f0000000880)=""/147, 0x93}, {&(0x7f0000000940)=""/253, 0xfd}, {&(0x7f0000000a40)=""/232, 0xe8}], 0x5, &(0x7f0000001040)=[{&(0x7f0000000bc0)=""/187, 0xbb}, {&(0x7f0000000c80)=""/96, 0x60}, {&(0x7f0000000d00)=""/160, 0xa0}, {&(0x7f0000000dc0)=""/166, 0xa6}, {&(0x7f0000000e80)=""/229, 0xe5}, {&(0x7f0000000f80)=""/188, 0xbc}], 0x6, 0x0) poll(&(0x7f00000010c0)=[{r3, 0x2}, {r2, 0x402}, {r1, 0x4044}, {r0, 0x5010}, {r1, 0x1000}, {r1, 0x1000}, {r0, 0x4000}, {r2, 0x8000}], 0x8, 0x10000) syz_mount_image$nfs4(&(0x7f0000000200)='nfs4\x00', &(0x7f0000000280)='./file0\x00', 0x5, 0x3, &(0x7f0000000580)=[{&(0x7f00000002c0)="21568ebb279ef699e67a94816a6650cf653d87957145c9eb0b251f0d062b607ec59174a4474f37949c6f9fb2be679c5c2fc80d5a60338826f11cecdeece821cbe5e144f61cfdfb5ce7f38543be882fb58bc8ec91f6e8d171824dd76e17178edbd5d204ef571b78b5e7f5fe428838beea98992563762908a7e347d5d2c210536cd8a12b117601591a36dec21b4829e46705e36f6a4ae2", 0x96, 0x8}, {&(0x7f0000000380)="eff2f2093955c33b2f7a597f273e70333443642159673e2c805ea83804bd6880784027a288052c1031f404b13e77e92b458411e2b3226d9e0b52f7bfb76d9f36fee62cf51b75b9be22a8259a9100c8e9a5d3c574e147df216167cddea81728e8197abd6c4125d72b07e157f062ab5a28f745b3f42166aa48e6f06d9fd8f2f8cdbe54bb2cd19ef5a71fe1b4178d6a15780d00992c81857edbd5a14c107b5309bbdd8f2b85f9fece33a682a00573005db70f90d9a8410d1493689555d603e44b59e3605fa6df41d4e8f1d53ded9e3eac31846ef75e4baea39bb0dec4561bb9b0cf560644eff1014ef726589d7e20615dd6618a0a8dece0fee236d9cb788c", 0xfd, 0x6}, {&(0x7f0000000480)="ae1578cc831e5a3938d40f56d5fbe9250cfc92916722a03e5215695bf8f05159d36735ab0db789f02f35c7ac14299c98110cbdb611397a43c82c344548e71774e4819b4ae67878179bdb3048a35906460bdd6258279cb9035e9de449ea927cb9275293f919a8bde20cd299ce0311710c11ce9d24a714d7f136caf5ba0a9cdee38d2428f2c95cac229a038369fc7ef98b07527764d230dccd567ab62f78f203d66b8e9b1a51d03008313f20f0ecbdbb73d8ce1edd019727843e1b3c8dbda6b13036fd34b289027bd06b854fb2aab2c5", 0xcf, 0x2}], 0x100020, &(0x7f0000000600)='security.SMACK64EXEC\x00') getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000180)=0x4) 18:10:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x38, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x8, @mcast2}, @in6={0xa, 0x4e23, 0x5, @local, 0x99}]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYRES32=r2, @ANYBLOB="ca0000000000e8c37fc9fb88042bd228fbd225eb0000"], 0xe) 18:10:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1d6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:10:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x1fffffffd) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:16 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x280800, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 778.903497][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 778.903503][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 778.909336][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 778.915024][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 778.983480][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 778.989378][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:10:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc4c85513, &(0x7f0000001000)) 18:10:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1d7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 779.090057][ T25] audit: type=1800 audit(1555438216.138:178): pid=8521 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17518 res=0 18:10:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:16 executing program 2: ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) socket$xdp(0x2c, 0x3, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCEXCL(r1, 0x540c) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') fallocate(r2, 0x0, 0x7ff, 0x10ffff) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x100) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000001c0)={0x77, 0xb6, 0xa, 0xa, 0x7c000000000000}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:16 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:16 executing program 3: r0 = socket(0x10, 0x80002, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000040)="24000000030607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) 18:10:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1d8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000180)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x98f904}) 18:10:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:16 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2e, 0x0) getsockname$unix(r1, &(0x7f00000000c0), &(0x7f0000000180)=0x6e) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x181080) connect$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xff, 0x3ff, 0x40, 0x1a, 0x6, 0x40}, 0x6}, 0xa) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000040)={0x0, 0xd3}) 18:10:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1d9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:16 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x404, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000040), 0x4) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000080)={'team_slave_0\x00', {0x2, 0x4e21, @multicast2}}) socket$rds(0x15, 0x5, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x400000, 0x0) socket$nl_route(0x10, 0x3, 0x0) 18:10:16 executing program 3: pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 18:10:16 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0xc5, 0x6, &(0x7f0000000580)=[{&(0x7f0000000180)="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", 0xfa, 0x7}, {&(0x7f0000000080)="0a5315ef537947bf84a2b4887a1e74f6a57fc9648eba7fac963adb5d3d73c00189c0935c2beeaf542a514d47f9b92069f7c558f3fb985ba0a7b878c6fe623fca3ceda3e873c6c566f0d6b2de11aff5ab6c38c02b5a43321d8cc076d77a0c7ed8bebcf96fadf5671fd92007e161db70101fd52c52b01a5b1d32589aac36bb61d44f2b85745392e6e44fd49baa", 0x8c, 0x101}, {&(0x7f0000000280)="feb0552e53ab946beed43203f4d125953af156f3f5bd6a15983136162676fbe8706ac6d23c3ae778bf0a775d04ac3e4fa01905c1d95f3158b4fa890ee2c3fc00b3ad8c3da5e5cf22a4d7bffc8710ec", 0x4f, 0x9}, {&(0x7f0000000300)="fa6a58aee5b28ab5b2e977810267f5b8ee557dda6cd2aa18de65c787b2ed0cc8ca988b8fac5cd9a132220d83b2c40ba1ab7fafb588365d8e8fd78382e3693ee8c308eebb71d37c1baa82afc340930e85581f904b163bdf12f71c218f82c4871e2c8307be24155145346bb3816c927426fe2a0b82ad3fcae91d87e2fe6816052e154602f7e9a88e05bcecab3f20220d0b2f5f327157b82825670b8320bdc97887089dc78a80873845ba2a296b5bad7c6c6600d59083c76c33049b0166618a1cafdddaa3f73a54d17452bdd48d414be6bcb58627cc6258d486ad3ff63099ac703af5ee5e2a1082b536e527ee0394bc2293b0353979c6", 0xf5, 0x2}, {&(0x7f0000000400)="3c0e1db7ba6c5bfe4d2d50965fb6733e38fa30d947ec92263cebaf6ac7830a56525d0075ea15cddd23c4120a47bc9863d59a7aa47960c98b04cb19b7ae51f190994c4ce69377bcc8cff2b37ddda602d779e96f0ae38e86c7ead2e2b1457faa8327106a1a88b4959a75fd258bca4487a2d74e0d81be091494c9782b4199aeb373050f46fca01d9e01282d082e", 0x8c, 0x862}, {&(0x7f00000004c0)="070480aa3ceb30aa9bff6a716f5504e8809b681c101c20ff6723c875413e866bdd92c76d2a20b880f0905c32605a7d16f580fcbc88988e48ce1ff22201f32ae9587bb5f64e41214824f4666253c81e90f637eb37852737c79b1462f2461d71b14f32793c07298a780ed3536958cd4e52d0484d35a4026ebbd68cba8fb9b223a9418d0241fe752b99", 0x88}], 0x80, &(0x7f00000006c0)={[{@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}], [{@measure='measure'}, {@uid_eq={'uid', 0x3d, r1}}]}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) [ 779.851828][ T25] audit: type=1800 audit(1555438216.898:179): pid=8906 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16548 res=0 18:10:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1da, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x80000000000000) fallocate(r1, 0x0, 0x0, 0x9) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x6) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140)={0x9}, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r1, &(0x7f0000000280)=@short={0xb, @dev, @null, 0x1, @netrom}, 0x1c) 18:10:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x3c) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000040)={0x1, 0x0, {0x8, 0x950f, 0x3037, 0x4, 0xf, 0x3, 0x2, 0x2}}) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xfffffffffffffffe, 0x8, {{0x2, 0x760, 0x559, 0x1000, 0x6, 0x1ff, 0x6, 0x800}}}, 0x60) 18:10:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x160, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 780.141840][ T9250] EXT4-fs warning (device sda1): ext4_group_extend:1769: can't shrink FS - resize aborted 18:10:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1db, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:17 executing program 3: clone(0x2902001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x201, &(0x7f0000000000)={0x0}) 18:10:17 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast2}, 0xe91}}}, 0x84) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000040)=""/68) r3 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x161, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000300)={0x0, 0x0, [], @raw_data=[0x7, 0x9b, 0x9, 0x7, 0xfffffffffffffff9, 0x780, 0x7, 0xffffffffffffffff, 0x3f, 0x400, 0x200, 0x5, 0x1, 0x3, 0xff, 0x9, 0x81, 0x8001, 0x100000001, 0x3, 0xffffffffffffff37, 0x0, 0x6, 0x5, 0x2, 0x74ca, 0x4, 0x4bb01f37, 0x8, 0x0, 0x4, 0x619f]}) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r0, 0x0, 0x5, 0xffffffff00000001, 0x1}) lseek(r0, 0x0, 0x3) 18:10:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1dc, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 780.440043][ T25] audit: type=1800 audit(1555438217.488:180): pid=9250 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17520 res=0 18:10:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x15f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 780.680759][ T25] audit: type=1800 audit(1555438217.728:181): pid=9539 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17527 res=0 18:10:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1dd, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x162, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) io_setup(0x4, &(0x7f0000000140)=0x0) io_cancel(r2, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x2, 0x0, r0, &(0x7f0000000180)="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", 0x1000, 0x32c7, 0x0, 0x1, r0}, &(0x7f00000011c0)) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000000)) ioctl$LOOP_CLR_FD(r0, 0x4c01) 18:10:18 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, 0x0) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f0000000040)) 18:10:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1de, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x160, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x163, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="6fa3361a2c08a8dd13731d8412df6b11", 0x10) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:18 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{0x8799, 0x100000001, 0x1f, 0xfffffffffffff4be}, 'syz1\x00', 0x5}) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x1, 0xfffffffffffffffd) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x7f, 0x5468, 0xfffffffffffffff7, 0xff, 0x27f, "37f5d05277d622f37bd35a4c0d3fe0076c69cd", 0x1, 0x4}) 18:10:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1df, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x161, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x164, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:18 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x0) 18:10:18 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x8000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1a4, r1, 0x300, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x13}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="b066dec716e4ba095fb2469e0d24a360"}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xb9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="6764a7b53e716837a3c50cab2e059761"}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x79}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x11}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x69}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x15}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11, 0x1}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x32, 0x6}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x20}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x800}, 0x4048000) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0xc440) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x0, 0x3, 0x700000000000000}) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, 0x0) 18:10:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000180)=""/129) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8000, 0x40000) lseek(r0, 0x0, 0x3) 18:10:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1e0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x162, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:18 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x6) 18:10:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x165, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1e1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:18 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 18:10:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x163, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000007c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x404000}, 0xc, &(0x7f0000000780)={&(0x7f0000000580)={0x1d0, r2, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x120000000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x101}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}]}, @TIPC_NLA_LINK={0xa8, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80d7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff2d4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x73}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x8050}, 0x80) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000008c0)=""/108) fcntl$setownex(r1, 0xf, &(0x7f0000000880)={0x2}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000180)="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") ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000940)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x1e59}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000440)={r3, @in={{0x2, 0x4e23, @empty}}, 0x1000, 0x41ca}, 0x90) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000009c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f0000000300)={&(0x7f0000000800)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020026bd0000fc1300010900000000020000000001000000b5000057b4223f4aee9c20911609e9b78427604af26247ea893029252f67bc69"], 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x20000880) lseek(r0, 0x0, 0x3) 18:10:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x4000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xc4, r3, 0x3, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x57}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7f}]}, 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x20000080) write$P9_RLINK(r2, &(0x7f0000000040)={0x7, 0x47, 0x1}, 0x7) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000000c0)={0x5, 0x6, 0x4, 0xfff, 0x100000000}) getpeername$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:19 executing program 3: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 18:10:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x166, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x164, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1e2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:19 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) 18:10:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1}) lseek(r0, 0x0, 0x3) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x4) keyctl$revoke(0x3, r2) 18:10:19 executing program 3: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 18:10:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x40000, &(0x7f0000000180)=ANY=[@ANYBLOB="696e64657878696e6f3d6f6e2c78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c757070657215ce22574416b4e26c65302c6d657461676f70793d6f66662c736d61636b66736861743d2f6465762f6c6f6f7023002c617070726173ff655f747970653d696d617369672c826f6e745f686173682cffffffff00c0491d6b231b2c0a88bc51144ac26eab79343290439f652b2b29390d1b2979c68d9aea93aa5fc4e4cc307eb201d121c50c6a"]) 18:10:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x167, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1e3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x165, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x5, 0x70, 0x31823b28, 0x6, 0x800, 0x8, 0x0, 0x8, 0x28, 0x9, 0x4, 0x7, 0x4817dbca, 0x1, 0x800, 0x2, 0x2, 0x0, 0x5, 0x30, 0x837800000000, 0x80, 0x7, 0x9, 0x8, 0x5, 0x9, 0xfb, 0x1, 0x100000000, 0x9, 0x10001, 0x7, 0xff, 0x80, 0x1f, 0x5, 0xcc, 0x0, 0x5, 0x3, @perf_config_ext={0x5, 0x8}, 0x20010, 0x5, 0x58, 0x0, 0x1c69, 0x1, 0x3}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x200000000, 0x3, 0x4}) lseek(r1, 0x4, 0x3) [ 782.583491][ C1] net_ratelimit: 12 callbacks suppressed [ 782.583499][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 782.595050][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:19 executing program 3: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 18:10:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) 18:10:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x168, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x166, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1e4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x9, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) modify_ldt$write(0x1, &(0x7f0000000000)={0x8, 0x20001000, 0xffffffffffffffff, 0xfffffffffffffffc, 0x8, 0x1ff, 0x1, 0x12, 0x0, 0x4}, 0x10) 18:10:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x4, 0x1a, 0x9, 0x1a, 0x7, 0x3, 0x5, 0x166, 0xfffffff7ffffffff}) lseek(r0, 0x0, 0x3) 18:10:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4006, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 18:10:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1e5, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x169, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 783.062799][ T25] audit: type=1800 audit(1555438220.108:182): pid=11286 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17554 res=0 [ 783.086800][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 783.086847][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 783.093505][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 783.104275][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:10:20 executing program 2: times(&(0x7f0000000140)) [ 783.143506][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 783.149410][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:10:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1e6, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) lseek(r0, 0x0, 0x4) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r0, &(0x7f0000000180)="0392ea1800000000000000573ebf87d7", 0x10, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x0) 18:10:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x167, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000008100000086dd60b40900000800000202430080000000000000000000000000013a2290780007040060b680fa00000000000000000000ffffffffffff00000000000000000000ffffac14ffbb7c15a7e8289271b5657e"], 0x0) [ 783.398629][ T25] audit: type=1800 audit(1555438220.448:183): pid=11514 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17554 res=0 18:10:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) sched_setparam(r2, &(0x7f0000000180)=0x3) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) [ 783.511073][ T25] audit: type=1800 audit(1555438220.558:184): pid=11513 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17552 res=0 [ 783.543493][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 783.559912][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1e7, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) dup(r0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) getdents64(r1, &(0x7f00000000c0)=""/11, 0xeb) 18:10:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) 18:10:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x168, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x200000000, 0x6) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000180)=""/212) 18:10:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1e8, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="ee000000000000009bd070") clone(0x200, 0x0, 0x0, 0x0, 0x0) r1 = getpgid(0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000015) 18:10:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 18:10:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x169, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1e9, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 784.237288][ T25] audit: type=1800 audit(1555438221.288:185): pid=11798 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17554 res=0 18:10:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) 18:10:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) dup(r0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) getdents64(r1, &(0x7f00000000c0)=""/11, 0xeb) 18:10:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000200)={0x1, 0x0, 0x102, 0x3, {0xff, 0x3251, 0x80, 0x1}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x9) fallocate(r1, 0x0, 0x0, 0x10ffff) pwrite64(r2, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000180)=0x6) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000240)={0x11df, 0x3f}) lseek(r1, 0x0, 0x3) 18:10:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ea, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16a, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x400002, 0x2, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) write$binfmt_elf64(r1, 0x0, 0xfffffffffffffd17) r2 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) fcntl$setownex(r2, 0xf, &(0x7f0000000580)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000480)=0xc) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000001c0)={0xffffffffffffffff, {{0x2, 0x4e22, @remote}}}, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) 18:10:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) dup(r0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) getdents64(r1, &(0x7f00000000c0)=""/11, 0xeb) 18:10:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1eb, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16b, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 786.226051][ T25] audit: type=1800 audit(1555438223.268:186): pid=12239 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17581 res=0 18:10:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ec, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) [ 787.059801][ T25] audit: type=1800 audit(1555438224.108:187): pid=12595 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17575 res=0 [ 787.703963][ C1] net_ratelimit: 18 callbacks suppressed [ 787.704016][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 787.716017][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 788.824031][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 788.830532][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:26 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) dup(r0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) getdents64(r1, &(0x7f00000000c0)=""/11, 0xeb) 18:10:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16c, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ed, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x200, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x1000, 0x9, 0x1, 0x6}) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:26 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 18:10:26 executing program 2: r0 = socket(0x2, 0x3, 0xff) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x1cf}}, 0x20) [ 789.303484][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 789.303514][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 789.309306][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ee, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 789.383661][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 789.390254][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:10:26 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000080)={0xffffffffffffff46, 0x0, 0x0, 0xfffffffffffffec8, 0x0, 0x0}) 18:10:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x170, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16d, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x4, 0x9) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) recvfrom$inet(r1, &(0x7f0000000000)=""/56, 0x38, 0x2060, &(0x7f0000000180)={0x2, 0x4e24, @broadcast}, 0x10) [ 789.741741][T12877] binder: 12876 BINDER_GET_NODE_INFO_FOR_REF: only handle may be non-zero. [ 789.741756][T12877] binder: 12876:12877 ioctl c018620c 20000080 returned -22 [ 789.783491][ C1] protocol 88fb is buggy, dev hsr_slave_0 18:10:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) dup(r0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) getdents64(r1, &(0x7f00000000c0)=""/11, 0xeb) 18:10:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1ef, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") sendmmsg$unix(r0, &(0x7f0000003f40)=[{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f00000009c0)='\t', 0x1}], 0x1}], 0x1, 0x1) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x2) 18:10:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) signalfd(r0, &(0x7f0000000000)={0xdf3}, 0x8) fallocate(r0, 0x0, 0x0, 0x10ffff) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000180)={0xa, 0xfffffffffffffffa, 0xfffffffffffffff9}) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16e, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x171, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x800000000024) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 18:10:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1f0, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 791.422581][ T25] audit: type=1800 audit(1555438228.468:188): pid=13099 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16945 res=0 18:10:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x172, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write(r0, &(0x7f0000000180)="3f25bd3d3bdd315783ecd566347fdd615ebbb515604aa4aee8bd163226feee42356d7ef1d736b5949ca2ac1547dc136314c75467c9745d46a1e185f09d3b8ed0215552f9275b6c8faebecabaa6aebc120bd3d4618e9a7b33fbccb7843942732d97bbdf7cf7b948229f0cae145a84586b62adc97b00dc52652880", 0x7a) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$KDENABIO(r1, 0x4b36) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x16f, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1f1, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 791.654358][ T25] audit: type=1800 audit(1555438228.708:189): pid=13319 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16930 res=0 [ 791.759721][ T25] audit: type=1800 audit(1555438228.748:190): pid=13328 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16961 res=0 [ 792.984253][ C1] net_ratelimit: 10 callbacks suppressed [ 792.984293][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 793.007227][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:10:30 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) dup(r0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getdents64(r1, &(0x7f00000000c0)=""/11, 0xeb) 18:10:30 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) dup(r1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_CLR_FD(r0, 0x4c01) 18:10:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x2000000000, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) sched_setaffinity(0x0, 0xffffff55, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) sysfs$3(0x3) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) lseek(r0, 0x0, 0x3) 18:10:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1f2, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000003240)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="291ff46ed6ab2371", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x170, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x173, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 793.254127][T13554] WARNING: CPU: 1 PID: 13554 at fs/attr.c:234 notify_change+0xca2/0xfb0 [ 793.262498][T13554] Kernel panic - not syncing: panic_on_warn set ... [ 793.269096][T13554] CPU: 1 PID: 13554 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #70 [ 793.277191][T13554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.287465][T13554] Call Trace: [ 793.290773][T13554] dump_stack+0x172/0x1f0 [ 793.295122][T13554] ? notify_change+0xc60/0xfb0 [ 793.299914][T13554] panic+0x2cb/0x65c [ 793.303827][T13554] ? __warn_printk+0xf3/0xf3 [ 793.308438][T13554] ? notify_change+0xca2/0xfb0 [ 793.313212][T13554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.319463][T13554] ? __warn.cold+0x5/0x45 [ 793.323824][T13554] ? notify_change+0xca2/0xfb0 [ 793.328594][T13554] __warn.cold+0x20/0x45 [ 793.332847][T13554] ? notify_change+0xca2/0xfb0 [ 793.337652][T13554] report_bug+0x263/0x2b0 [ 793.342168][T13554] do_error_trap+0x11b/0x200 [ 793.346770][T13554] do_invalid_op+0x37/0x50 [ 793.351190][T13554] ? notify_change+0xca2/0xfb0 [ 793.355960][T13554] invalid_op+0x14/0x20 [ 793.360133][T13554] RIP: 0010:notify_change+0xca2/0xfb0 [ 793.365507][T13554] Code: 14 52 0a 00 e8 8f 9a b7 ff 4c 8b 7c 24 20 4c 89 ff e8 a2 4f 4a 01 89 de 4c 89 ff e8 88 6b 4a 01 e9 33 fa ff ff e8 6e 9a b7 ff <0f> 0b e9 42 f4 ff ff e8 62 9a b7 ff 44 89 f3 4c 89 ea 48 b8 00 00 [ 793.371146][ T3874] kobject: 'loop1' (00000000921905f1): kobject_uevent_env [ 793.386076][T13554] RSP: 0018:ffff8880575874c0 EFLAGS: 00010212 [ 793.386089][T13554] RAX: 0000000000040000 RBX: 0000000000004200 RCX: ffffc9000a289000 [ 793.386096][T13554] RDX: 0000000000009769 RSI: ffffffff81b8f242 RDI: 0000000000000007 [ 793.386104][T13554] RBP: ffff888057587510 R08: ffff888086810300 R09: ffffed101479c78c [ 793.386113][T13554] R10: ffffed101479c78b R11: ffff8880a3ce3c5f R12: ffff888057587560 [ 793.386121][T13554] R13: ffff8880a3ce3b80 R14: 0000000000000000 R15: ffff8880575875f0 [ 793.386149][T13554] ? notify_change+0xca2/0xfb0 [ 793.386173][T13554] file_remove_privs+0x2a9/0x480 [ 793.411179][ T3874] kobject: 'loop1' (00000000921905f1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 793.415359][T13554] ? dentry_needs_remove_privs.part.0+0x80/0x80 [ 793.415395][T13554] ? __kernel_text_address+0xd/0x40 [ 793.415411][T13554] ? unwind_get_return_address+0x61/0xa0 [ 793.415425][T13554] ? __save_stack_trace+0x99/0x100 [ 793.415450][T13554] __generic_file_write_iter+0x15e/0x630 [ 793.445333][ T3874] kobject: 'loop4' (000000002894be8d): kobject_uevent_env [ 793.449208][T13554] blkdev_write_iter+0x23a/0x440 18:10:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x21, 0x0, 0x3) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) fcntl$setstatus(r1, 0x4, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) fsetxattr$security_smack_transmute(r1, &(0x7f0000001180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000011c0)='TRUE', 0x4, 0x1) lseek(r0, 0x0, 0x3) sendto$rxrpc(r1, &(0x7f0000000180)="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", 0x1000, 0x40844, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0xffffffff, @mcast2, 0xe8d6}}, 0x24) 18:10:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1f3, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 18:10:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x174, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 793.449224][T13554] ? __blkdev_get+0x1660/0x1660 [ 793.449241][T13554] ? 0xffffffff81000000 [ 793.475017][ T3874] kobject: 'loop4' (000000002894be8d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 793.477474][T13554] ? __might_sleep+0x95/0x190 [ 793.477496][T13554] do_iter_readv_writev+0x5e1/0x8e0 [ 793.477515][T13554] ? vfs_dedupe_file_range+0x780/0x780 [ 793.502640][ T3874] kobject: 'loop5' (00000000580f1439): kobject_uevent_env [ 793.507161][T13554] ? rw_verify_area+0x118/0x360 [ 793.507178][T13554] do_iter_write+0x184/0x610 [ 793.507193][T13554] ? rcu_read_lock_sched_held+0x110/0x130 [ 793.507212][T13554] ? __kmalloc+0x5d5/0x740 [ 793.514636][ T3874] kobject: 'loop5' (00000000580f1439): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 793.521496][T13554] vfs_iter_write+0x77/0xb0 [ 793.521522][T13554] iter_file_splice_write+0x662/0xbe0 [ 793.583616][T13554] ? atime_needs_update+0x5f0/0x5f0 [ 793.589297][T13554] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 793.596887][T13554] ? rw_verify_area+0x118/0x360 [ 793.601843][T13554] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 793.607860][T13554] direct_splice_actor+0x126/0x1a0 [ 793.613203][T13554] splice_direct_to_actor+0x369/0x970 [ 793.618684][T13554] ? generic_pipe_buf_nosteal+0x10/0x10 [ 793.624520][T13554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.630876][T13554] ? do_splice_to+0x190/0x190 [ 793.635573][T13554] ? rw_verify_area+0x118/0x360 [ 793.640451][T13554] do_splice_direct+0x1da/0x2a0 [ 793.645323][T13554] ? splice_direct_to_actor+0x970/0x970 [ 793.650997][T13554] ? rw_verify_area+0x118/0x360 18:10:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x1f4, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 793.655877][T13554] do_sendfile+0x597/0xd00 [ 793.660344][T13554] ? do_compat_pwritev64+0x1c0/0x1c0 [ 793.666337][T13554] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 793.672595][T13554] ? put_timespec64+0xda/0x140 [ 793.677394][T13554] __x64_sys_sendfile64+0x1dd/0x220 [ 793.682630][T13554] ? __ia32_sys_sendfile+0x230/0x230 [ 793.687925][T13554] ? do_syscall_64+0x26/0x610 [ 793.692612][T13554] ? lockdep_hardirqs_on+0x418/0x5d0 [ 793.698269][T13554] ? trace_hardirqs_on+0x67/0x230 18:10:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9) fallocate(r0, 0x0, 0x0, 0x10ffff) pwrite64(r1, &(0x7f0000000100)='?', 0x1, 0x400000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) getgid() ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000180)={'syzkaller1\x00', 0xb4bf, 0xffffffff}) lseek(r0, 0x0, 0x3) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ftruncate(r2, 0xdab) 18:10:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a", 0x5) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x175, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 793.701655][ T3874] kobject: 'loop4' (000000002894be8d): kobject_uevent_env [ 793.703308][T13554] do_syscall_64+0x103/0x610 [ 793.714981][T13554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.720885][T13554] RIP: 0033:0x458c29 [ 793.724159][ T3874] kobject: 'loop4' (000000002894be8d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 793.724778][T13554] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 793.724787][T13554] RSP: 002b:00007f82664dcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 793.724799][T13554] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000458c29 [ 793.724812][T13554] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 793.777490][ T3874] kobject: 'loop5' (00000000580f1439): kobject_uevent_env [ 793.781136][T13554] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 793.781145][T13554] R10: 000000000200000d R11: 0000000000000246 R12: 00007f82664dd6d4 [ 793.781154][T13554] R13: 00000000004c5e10 R14: 00000000004da5c8 R15: 00000000ffffffff [ 793.789585][T13554] Kernel Offset: disabled [ 793.817780][T13554] Rebooting in 86400 seconds..