0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:08 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(r0, 0x402, 0x0) [ 953.203616][T22949] devpts: called with bogus options 06:10:08 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) 06:10:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x0, 0x5}, 0x10) sendmmsg$inet(r0, &(0x7f0000009380)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="af", 0x1}], 0x1}}], 0x1, 0x40040) 06:10:09 executing program 1: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000002d00)) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000880)}, {&(0x7f0000001880)="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", 0xffc}, {&(0x7f0000000340)="cf80ee8405d61e5f5ff50eb232959dc8f0f0299f0996594d1c28f3fa53d81f7351f00608bac70ba27ac4004a9ccd6f3760b7177b71bbbd8ef1497a5df7ecf87ed230d913f2007e0fa0448d811da205defbe2eede032037abefc896671d82844d689967d321860abe907cb91c74eb5b62276dc4c37a2b8d3745bd76f626c69890bdc380d566d5cec7faed38315f793555b0faa4bb329eee6cda334b5c667c7fae81608f330cb6253a3e0440ef8d5527a3857383cc2693f69d8f629dfcf84721", 0xbf}, {&(0x7f00000002c0)="3bf55cf5d68d5fac1f592143a81ea3dbd5ef4ea1b59bd35bd19f394b5952", 0x1e}], 0x4}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{&(0x7f00000004c0)}, {&(0x7f00000005c0)="5c3154210d74f3e988331b7e7e35db2bc9d5649667e727a1102226a8e70fc1c1d52384f2da0e6d7f6a60d60b4d46bb6cb9fdcf28c585f26561a8ac2a2bf3e3e4194264a97b0af1bf6377b848c8db2fc7b5a38045563a8a7b36372ddd", 0x5c}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x3, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)}, {&(0x7f0000002f00)}, {&(0x7f0000002f40)="68f4884a11", 0x5}], 0x3, &(0x7f0000003080), 0x0, 0x4000000}], 0x3, 0x40000) keyctl$get_keyring_id(0x0, 0x0, 0x0) r5 = creat(0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 953.443059][T23062] devpts: called with bogus options [ 953.456342][T23071] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:09 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, 0x0) 06:10:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 953.618543][T23076] devpts: called with bogus options 06:10:09 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) creat(&(0x7f0000000300)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x28, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0x5, r4}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:09 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, 0x0, 0x0) 06:10:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635202100000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$inet6(0xa, 0x3, 0x7) 06:10:09 executing program 1: poll(&(0x7f00000001c0)=[{}], 0x2366, 0x0) [ 953.887139][T23092] devpts: called with bogus options [ 953.890827][T23093] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 953.922151][T23096] misc userio: Invalid payload size 06:10:09 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x80003, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14}}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:10:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0x18004a}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:10:09 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) creat(&(0x7f0000000300)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x28, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0x5, r4}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) [ 954.186148][T23214] devpts: called with bogus options [ 954.196964][ T27] kauditd_printk_skb: 19 callbacks suppressed [ 954.196993][ T27] audit: type=1804 audit(1580623809.873:257): pid=23214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/426/file0" dev="sda1" ino=17010 res=1 06:10:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635202100000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$inet6(0xa, 0x3, 0x7) [ 954.253772][ T27] audit: type=1804 audit(1580623809.913:258): pid=23214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/426/file0" dev="sda1" ino=17010 res=1 06:10:10 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) creat(&(0x7f0000000300)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 954.503553][T23230] devpts: called with bogus options [ 954.531064][ T27] audit: type=1804 audit(1580623810.213:259): pid=23230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/427/file0" dev="sda1" ino=16695 res=1 06:10:10 executing program 3: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cpuset\x00') 06:10:10 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:10:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x28, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0x5, r4}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:10 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 954.591088][ T27] audit: type=1804 audit(1580623810.213:260): pid=23230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/427/file0" dev="sda1" ino=16695 res=1 06:10:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_int(r0, 0x29, 0x4, 0x0, &(0x7f0000000140)) [ 954.775497][T23242] devpts: called with bogus options 06:10:10 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 954.807863][ T27] audit: type=1804 audit(1580623810.483:261): pid=23242 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/428/file0" dev="sda1" ino=16562 res=1 [ 954.857729][ T27] audit: type=1804 audit(1580623810.523:262): pid=23242 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/428/file0" dev="sda1" ino=16562 res=1 06:10:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:10 executing program 1: creat(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') 06:10:10 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000440)) 06:10:10 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) [ 955.060634][T23259] __nla_validate_parse: 2 callbacks suppressed [ 955.060645][T23259] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:10 executing program 3: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cpuset\x00') 06:10:10 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@rand_addr="c497fca682d049a62506796b3a6f3d06", 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x4000000}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}}}, 0xe8) [ 955.213814][T23266] devpts: called with bogus options [ 955.220983][T23263] devpts: called with bogus options 06:10:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {0x0}}, 0x18) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635202100000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x1f004}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 06:10:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) [ 955.251371][ T27] audit: type=1804 audit(1580623810.933:263): pid=23266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/429/file0" dev="sda1" ino=16865 res=1 [ 955.331229][ T27] audit: type=1804 audit(1580623810.983:264): pid=23266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/429/file0" dev="sda1" ino=16865 res=1 06:10:11 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 955.454209][T23285] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:11 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000009380)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="af", 0xfffffdd5}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40040) 06:10:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') sendfile(r0, r0, &(0x7f0000000040)=0x73ffffff, 0x5) [ 955.559595][T23292] devpts: called with bogus options 06:10:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x7, 0xfffffffffffffffc}, 0x4) [ 955.589587][ T27] audit: type=1804 audit(1580623811.273:265): pid=23292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/430/file0" dev="sda1" ino=16695 res=1 06:10:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 955.653581][ T27] audit: type=1804 audit(1580623811.303:266): pid=23292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/430/file0" dev="sda1" ino=16695 res=1 06:10:11 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) r8 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r8, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet(0x10, 0x3, 0x0) sendmsg(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x6c}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x3c}, 0x0, @in=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 06:10:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:11 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000000)=0x7f, 0x4) [ 955.963808][T23319] devpts: called with bogus options 06:10:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 956.063163][T23327] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:11 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) r8 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r8, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet(0x10, 0x3, 0x0) sendmsg(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:11 executing program 3: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(r1) stat(0x0, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) lstat(&(0x7f0000002980)='./file0\x00', 0x0) getegid() r3 = gettid() ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) tkill(0x0, 0x0) open(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000030c0)=[{0x0, 0x0, 0x0}, {0x0, 0x0, &(0x7f0000003040)=[{0x0}, {0x0}, {&(0x7f0000002f40)}], 0x3}], 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) creat(0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x7, 0xfffffffffffffffc}, 0x4) 06:10:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 956.338550][T23344] devpts: called with bogus options 06:10:12 executing program 3: syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) 06:10:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x85d, 0x4) 06:10:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 956.427987][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 956.433767][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 956.549057][T23360] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:12 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) r8 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r8, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet(0x10, 0x3, 0x0) sendmsg(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:12 executing program 3: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x145) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) 06:10:12 executing program 1: mkdir(0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:10:12 executing program 2: readv(0xffffffffffffff9c, &(0x7f00000016c0)=[{&(0x7f0000002740)=""/4102, 0x1006}], 0x16c) mknod(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x81, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000140), 0x8}], 0x28d, 0x0) 06:10:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 956.764605][T23371] devpts: called with bogus options 06:10:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:12 executing program 3: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x145) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) 06:10:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$sock_int(r0, 0x1, 0x13, 0x0, &(0x7f00000000c0)) 06:10:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}}, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffb) [ 956.984565][T23390] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:12 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)) keyctl$get_keyring_id(0x0, 0x0, 0xea) r7 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}}, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffb) [ 957.197864][T23405] devpts: called with bogus options 06:10:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:12 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) 06:10:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000001e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001ec0)=0x14) 06:10:13 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000180)) [ 957.379133][T23521] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:13 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)) keyctl$get_keyring_id(0x0, 0x0, 0xea) r7 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000000), 0x4) 06:10:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) [ 957.624047][T23639] devpts: called with bogus options 06:10:13 executing program 1: clone(0x10a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:10:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000), 0x4) 06:10:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@empty}, 0x2, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 06:10:13 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) pipe(&(0x7f0000000100)) keyctl$get_keyring_id(0x0, 0x0, 0xea) r7 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 957.855602][T23650] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, 0x0, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:13 executing program 2: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80045010, &(0x7f0000000040)) 06:10:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635202100000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$inet6(0xa, 0x3, 0x7) 06:10:13 executing program 3: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(r0, 0x402, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cpuset\x00') 06:10:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, 0x0, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 957.963061][T23663] devpts: called with bogus options 06:10:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:13 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r7 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 958.266224][T23813] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, 0x0, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:14 executing program 3: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(r0, 0x402, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cpuset\x00') 06:10:14 executing program 1: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(r0, 0x402, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cpuset\x00') 06:10:14 executing program 2: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80045010, &(0x7f0000000040)) [ 958.412177][T23890] devpts: called with bogus options 06:10:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)) 06:10:14 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r7 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 958.743336][T23913] devpts: called with bogus options 06:10:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 06:10:14 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x40801, 0x0) 06:10:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:14 executing program 1: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(r0, 0x402, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cpuset\x00') [ 958.853596][T23918] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:14 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r7 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) 06:10:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000000)=""/81) [ 959.128903][T23935] devpts: called with bogus options 06:10:14 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x4c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r3, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) 06:10:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r0, &(0x7f0000000180)=0x74000000, 0x5) 06:10:15 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r7 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) [ 959.349622][T23951] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 06:10:15 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x80003, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe}}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:10:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:15 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000440)) [ 959.536810][T23963] devpts: called with bogus options [ 959.579707][ T27] kauditd_printk_skb: 14 callbacks suppressed [ 959.579727][ T27] audit: type=1804 audit(1580623815.263:281): pid=23963 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/440/file0" dev="sda1" ino=17281 res=1 06:10:15 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x4c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r3, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) [ 959.633186][T23970] cgroup: fork rejected by pids controller in /syz4 06:10:15 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 959.713281][ T27] audit: type=1804 audit(1580623815.263:282): pid=23963 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/440/file0" dev="sda1" ino=17281 res=1 [ 959.795160][T23977] devpts: called with bogus options 06:10:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x7}, 0x4) [ 959.831833][ T27] audit: type=1804 audit(1580623815.503:283): pid=23977 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/441/file0" dev="sda1" ino=17425 res=1 06:10:15 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x4c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r3, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) [ 959.899355][ T27] audit: type=1804 audit(1580623815.513:284): pid=23977 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/441/file0" dev="sda1" ino=17425 res=1 06:10:15 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 960.068496][T23991] __nla_validate_parse: 1 callbacks suppressed [ 960.068510][T23991] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 960.186486][T23998] devpts: called with bogus options [ 960.203532][ T27] audit: type=1804 audit(1580623815.883:285): pid=23998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/442/file0" dev="sda1" ino=17553 res=1 06:10:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 06:10:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 960.246931][ T27] audit: type=1804 audit(1580623815.883:286): pid=23998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/442/file0" dev="sda1" ino=17553 res=1 [ 960.257983][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 960.277477][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:10:16 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/171, 0xab}], 0x1) 06:10:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 06:10:16 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 960.542704][T24007] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 960.577968][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 960.583803][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 960.661266][T24013] devpts: called with bogus options 06:10:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 960.686417][ T27] audit: type=1804 audit(1580623816.363:287): pid=24013 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/443/file0" dev="sda1" ino=17633 res=1 06:10:16 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 06:10:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) shutdown(r0, 0x1) [ 961.080170][T24226] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 961.129601][T24226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 961.137261][T24226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 06:10:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x7}, 0x4) 06:10:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 06:10:16 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) syz_open_pts(0xffffffffffffffff, 0x0) [ 961.215236][T24231] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 961.241857][T24228] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 961.267216][T24228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 961.275689][T24228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 961.332812][T24235] devpts: called with bogus options [ 961.354235][ T27] audit: type=1804 audit(1580623817.033:288): pid=24235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/444/file0" dev="sda1" ino=17457 res=1 06:10:17 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='coredump_filter\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8) 06:10:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 961.457978][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 961.463758][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:10:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffffffff000, 0x2}]) [ 961.505588][ T27] audit: type=1804 audit(1580623817.033:289): pid=24235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/444/file0" dev="sda1" ino=17457 res=1 06:10:17 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 961.649862][T24288] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x40806, 0x0) read(r0, &(0x7f00000000c0)=""/240, 0xf0) 06:10:17 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 961.841665][T24363] devpts: called with bogus options [ 961.857975][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 961.857981][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 961.858023][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 961.863731][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 961.887535][ T27] audit: type=1804 audit(1580623817.563:290): pid=24363 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/445/file0" dev="sda1" ino=17441 res=1 06:10:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x1, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x2c, 0xa, 0x0) ioctl$TUNSETGROUP(r3, 0x400454ce, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x400) 06:10:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 06:10:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 06:10:17 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:17 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:17 executing program 3: ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000680)="8a067bd8714fa8b1c1f48946abde1c6b276856b879b912d5fb39795723071e37dc0211c9ad57e9aaf782cd2c") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 962.114818][T24377] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 962.142700][T24378] devpts: called with bogus options 06:10:17 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) ioctl$TUNSETFILTEREBPF(r0, 0x6611, 0x0) 06:10:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 06:10:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='autogroup\x00') write$cgroup_subtree(r0, 0x0, 0x0) 06:10:18 executing program 0: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:18 executing program 3: ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000680)="8a067bd8714fa8b1c1f48946abde1c6b276856b879b912d5fb39795723071e37dc0211c9ad57e9aaf782cd2c") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 962.412627][T24401] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:18 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 962.524416][T24408] devpts: called with bogus options 06:10:18 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}, {0x0}], 0x2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0) 06:10:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000010c0)=ANY=[@ANYBLOB="003e6b0800ef0ea40b4f43a99fe4a5ea4c0000162080d90920515e0007e9ff288c42261e4833bb9839c300710e1387145a9bbea4c636e1f1d09a93a3e89f9521da03ab0d09000000f92bdae4810000000000000099fd411bb7020041cd4d4f230c557090343ddcdb15e71820410ba384643e870d813e1a83f9f4038b47ed11f867aa3fb0ba364102c91c5ce11a1997f48d14fdceff597af45c985fe63281f14bdc16bb6398e47e9513363b951c649417d98421814d671490627a416512f4fdd181e8942c900ea685400734a34eb17827af2c318350644dddf99f55cee264ebc4b4ab5c0abc9404c98dcf29d3088bd2a9be6c3e4b4df6043d585bf35e1b214a85b1ce4412190ca1f776b712c537604b3de53f295546cd66a292923465e4f1a3f484732f0d36828d9503be5c3ec7b59f8b7aeac131a74b1632cdbc792eff083a2d19948b6585e094c0d979fe96897dc85e806d507224b74068176652d5b5a40de4beb58f7fd7e1d70d2f13"], 0x16a) read(r0, &(0x7f00000000c0)=""/240, 0xf0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0xfff) ioctl$TCXONC(r0, 0x540a, 0x3) 06:10:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 06:10:18 executing program 0: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:18 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') dup2(r0, r1) [ 962.832644][T24428] devpts: called with bogus options [ 962.886751][T24432] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:18 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}, {0x0}], 0x2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0) 06:10:18 executing program 0: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x16a) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f00000000c0)=""/240, 0xf0) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) ioctl$TCXONC(r0, 0x540a, 0x3) 06:10:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 06:10:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_score_adj\x00') sendfile(r0, r0, 0x0, 0x9) [ 963.216989][T24454] devpts: called with bogus options 06:10:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 963.283177][T24462] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x16a) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f00000000c0)=""/240, 0xf0) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) ioctl$TCXONC(r0, 0x540a, 0x3) 06:10:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010010010270fff8", 0xffdf}], 0x0, 0x0) 06:10:19 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='autogroup\x00') write$cgroup_subtree(r0, 0x0, 0xc) 06:10:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 06:10:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 963.635097][T24480] devpts: called with bogus options [ 963.646583][T24485] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:19 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000400)=""/137, 0x89}], 0x1) 06:10:19 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) pread64(r0, 0x0, 0xa, 0x3808) 06:10:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 06:10:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 06:10:19 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 963.956636][T24501] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) pread64(r0, 0x0, 0xa, 0x3808) [ 964.018482][T24507] devpts: called with bogus options 06:10:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4], 0x2}}, 0x0) 06:10:19 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/89, 0x59}, {&(0x7f0000000100)=""/110, 0x6e}, {&(0x7f0000000180)=""/83, 0x53}, {&(0x7f0000000200)=""/215, 0xd7}, {&(0x7f0000000300)=""/251, 0xfb}, {&(0x7f0000000400)=""/82, 0x52}], 0x6, 0x0) 06:10:19 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) 06:10:19 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4], 0x2}}, 0x0) 06:10:20 executing program 3: 06:10:20 executing program 2: [ 964.389595][T24526] devpts: called with bogus options 06:10:20 executing program 1: 06:10:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:20 executing program 3: 06:10:20 executing program 2: 06:10:20 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4], 0x2}}, 0x0) 06:10:20 executing program 1: 06:10:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:20 executing program 3: [ 964.789831][T24547] devpts: called with bogus options 06:10:20 executing program 2: [ 964.820256][ T27] kauditd_printk_skb: 12 callbacks suppressed [ 964.820277][ T27] audit: type=1804 audit(1580623820.503:303): pid=24547 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/453/file0" dev="sda1" ino=16627 res=1 [ 964.906596][ T27] audit: type=1804 audit(1580623820.543:304): pid=24547 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/453/file0" dev="sda1" ino=16627 res=1 06:10:20 executing program 1: 06:10:20 executing program 3: 06:10:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) 06:10:20 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:20 executing program 2: 06:10:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 965.238237][T24569] devpts: called with bogus options [ 965.249671][T24572] __nla_validate_parse: 3 callbacks suppressed [ 965.249683][T24572] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:21 executing program 2: [ 965.265251][ T27] audit: type=1804 audit(1580623820.933:305): pid=24569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/454/file0" dev="sda1" ino=17489 res=1 06:10:21 executing program 3: 06:10:21 executing program 1: 06:10:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 965.383807][ T27] audit: type=1804 audit(1580623820.953:306): pid=24569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/454/file0" dev="sda1" ino=17489 res=1 06:10:21 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() gettid() open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:21 executing program 1: 06:10:21 executing program 3: 06:10:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) 06:10:21 executing program 2: [ 965.682426][T24591] devpts: called with bogus options [ 965.721446][ T27] audit: type=1804 audit(1580623821.403:307): pid=24591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/455/file0" dev="sda1" ino=16703 res=1 06:10:21 executing program 3: 06:10:21 executing program 1: 06:10:21 executing program 2: [ 965.813972][ T27] audit: type=1804 audit(1580623821.443:308): pid=24591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/455/file0" dev="sda1" ino=16703 res=1 [ 965.882810][T24702] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:21 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() gettid() open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:21 executing program 2: 06:10:21 executing program 1: 06:10:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) 06:10:21 executing program 3: [ 966.121465][T24711] devpts: called with bogus options 06:10:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 966.273717][T24814] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:22 executing program 1: 06:10:22 executing program 2: 06:10:22 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() gettid() open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:22 executing program 3: 06:10:22 executing program 2: 06:10:22 executing program 1: 06:10:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x3}}, 0x0) [ 966.573124][T24916] devpts: called with bogus options [ 966.593291][ T27] audit: type=1804 audit(1580623822.273:309): pid=24916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/457/file0" dev="sda1" ino=17457 res=1 06:10:22 executing program 3: 06:10:22 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 966.756422][ T27] audit: type=1804 audit(1580623822.303:310): pid=24916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/457/file0" dev="sda1" ino=17457 res=1 [ 966.785100][T24941] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:22 executing program 1: 06:10:22 executing program 2: [ 966.965178][T24945] devpts: called with bogus options 06:10:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:22 executing program 3: 06:10:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x3}}, 0x0) [ 967.001320][ T27] audit: type=1804 audit(1580623822.683:311): pid=24945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/458/file0" dev="sda1" ino=16703 res=1 06:10:22 executing program 2: 06:10:22 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getegid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:22 executing program 1: [ 967.104964][T24953] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 967.121397][ T27] audit: type=1804 audit(1580623822.723:312): pid=24945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/458/file0" dev="sda1" ino=16703 res=1 06:10:22 executing program 3: 06:10:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x3}}, 0x0) 06:10:23 executing program 2: [ 967.330668][T24978] devpts: called with bogus options 06:10:23 executing program 1: 06:10:23 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 967.488671][T25071] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:23 executing program 3: [ 967.667578][T25077] devpts: called with bogus options 06:10:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:23 executing program 2: 06:10:23 executing program 1: 06:10:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="000000000400"], 0x3}}, 0x0) 06:10:23 executing program 3: 06:10:23 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 967.865785][T25086] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:23 executing program 1: 06:10:23 executing program 2: 06:10:23 executing program 3: 06:10:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="000000000400"], 0x3}}, 0x0) 06:10:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 968.030350][T25093] devpts: called with bogus options 06:10:23 executing program 1: 06:10:23 executing program 2: 06:10:23 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 968.182531][T25103] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:24 executing program 3: 06:10:24 executing program 1: 06:10:24 executing program 2: 06:10:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="000000000400"], 0x3}}, 0x0) 06:10:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 968.454761][T25116] devpts: called with bogus options 06:10:24 executing program 3: 06:10:24 executing program 1: 06:10:24 executing program 2: 06:10:24 executing program 3: 06:10:24 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 968.675277][T25128] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:24 executing program 1: 06:10:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:24 executing program 2: 06:10:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000040000"], 0x3}}, 0x0) 06:10:24 executing program 3: [ 968.938947][T25140] devpts: called with bogus options 06:10:24 executing program 2: 06:10:24 executing program 1: [ 969.096450][T25153] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:24 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:24 executing program 3: 06:10:24 executing program 2: 06:10:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000040000"], 0x3}}, 0x0) [ 969.336004][T25165] devpts: called with bogus options 06:10:25 executing program 3: 06:10:25 executing program 1: 06:10:25 executing program 2: 06:10:25 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:25 executing program 1: 06:10:25 executing program 3: 06:10:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000040000"], 0x3}}, 0x0) 06:10:25 executing program 2: [ 969.769926][T25189] devpts: called with bogus options 06:10:25 executing program 3: 06:10:25 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:25 executing program 2: 06:10:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYBLOB="0000000004000002"], 0x2}}, 0x0) 06:10:25 executing program 1: 06:10:25 executing program 3: [ 970.081857][T25202] devpts: called with bogus options 06:10:25 executing program 2: 06:10:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x0, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 970.142926][ T27] kauditd_printk_skb: 14 callbacks suppressed [ 970.142945][ T27] audit: type=1804 audit(1580623825.823:327): pid=25202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/466/file0" dev="sda1" ino=16716 res=1 06:10:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYBLOB="0000000004000002"], 0x2}}, 0x0) 06:10:25 executing program 1: [ 970.264371][ T27] audit: type=1804 audit(1580623825.823:328): pid=25202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/466/file0" dev="sda1" ino=16716 res=1 06:10:26 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x0, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:26 executing program 3: [ 970.384270][T25221] __nla_validate_parse: 3 callbacks suppressed [ 970.384281][T25221] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:26 executing program 2: 06:10:26 executing program 1: [ 970.516162][T25227] devpts: called with bogus options [ 970.553783][ T27] audit: type=1804 audit(1580623826.233:329): pid=25227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/467/file0" dev="sda1" ino=16686 res=1 06:10:26 executing program 3: 06:10:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x0, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:26 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYBLOB="0000000004000002"], 0x2}}, 0x0) [ 970.696873][ T27] audit: type=1804 audit(1580623826.233:330): pid=25227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/467/file0" dev="sda1" ino=16686 res=1 06:10:26 executing program 2: 06:10:26 executing program 1: 06:10:26 executing program 3: [ 970.875849][T25246] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 970.941907][T25250] devpts: called with bogus options 06:10:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, 0x0) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 970.969767][ T27] audit: type=1804 audit(1580623826.653:331): pid=25250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/468/file0" dev="sda1" ino=17851 res=1 06:10:26 executing program 2: 06:10:26 executing program 1: 06:10:26 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:26 executing program 3: [ 971.100215][ T27] audit: type=1804 audit(1580623826.653:332): pid=25250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/468/file0" dev="sda1" ino=17851 res=1 06:10:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, 0x0) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) [ 971.255299][T25266] devpts: called with bogus options 06:10:27 executing program 2: [ 971.292160][ T27] audit: type=1804 audit(1580623826.973:333): pid=25266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/469/file0" dev="sda1" ino=16714 res=1 [ 971.326084][T25270] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:27 executing program 3: [ 971.412347][ T27] audit: type=1804 audit(1580623826.973:334): pid=25266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/469/file0" dev="sda1" ino=16714 res=1 06:10:27 executing program 1: 06:10:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:27 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:27 executing program 2: 06:10:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, 0x0) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 971.610410][T25383] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:27 executing program 1: 06:10:27 executing program 3: 06:10:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 971.745779][T25392] devpts: called with bogus options [ 971.763794][ T27] audit: type=1804 audit(1580623827.443:335): pid=25392 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/470/file0" dev="sda1" ino=16750 res=1 06:10:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/20, @ANYRES32, @ANYBLOB="0000000004000002"], 0x20}}, 0x0) 06:10:27 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 971.885453][ T27] audit: type=1804 audit(1580623827.443:336): pid=25392 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/470/file0" dev="sda1" ino=16750 res=1 06:10:27 executing program 3: 06:10:27 executing program 2: 06:10:27 executing program 1: 06:10:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 971.978330][T25403] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 972.037593][T25406] devpts: called with bogus options 06:10:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x2}}, 0x0) 06:10:27 executing program 1: 06:10:27 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:27 executing program 3: [ 972.275458][T25418] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:28 executing program 1: 06:10:28 executing program 2: [ 972.316420][T25422] devpts: called with bogus options 06:10:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:28 executing program 3: 06:10:28 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:28 executing program 1: 06:10:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x2}}, 0x0) 06:10:28 executing program 2: 06:10:28 executing program 3: 06:10:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 972.685685][T25440] devpts: called with bogus options 06:10:28 executing program 1: [ 972.724502][T25447] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:28 executing program 2: 06:10:28 executing program 3: 06:10:28 executing program 1: 06:10:28 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x2}}, 0x0) 06:10:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:28 executing program 3: 06:10:28 executing program 2: 06:10:28 executing program 1: [ 973.129750][T25468] devpts: called with bogus options [ 973.167181][T25469] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, 0x0, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:29 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:29 executing program 3: 06:10:29 executing program 2: 06:10:29 executing program 1: 06:10:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) [ 973.449232][T25582] devpts: called with bogus options 06:10:29 executing program 3: 06:10:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, 0x0, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:29 executing program 2: [ 973.510366][T25593] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:29 executing program 1: 06:10:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) 06:10:29 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:29 executing program 1: [ 973.722829][T25603] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:29 executing program 3: 06:10:29 executing program 2: 06:10:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, 0x0, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 973.862623][T25609] devpts: called with bogus options 06:10:29 executing program 2: 06:10:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) 06:10:29 executing program 1: 06:10:29 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) setresgid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:29 executing program 3: 06:10:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x0, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:29 executing program 2: [ 974.210572][T25628] devpts: called with bogus options 06:10:29 executing program 1: 06:10:30 executing program 3: 06:10:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x0, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:30 executing program 2: 06:10:30 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) setresgid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e0000", @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) 06:10:30 executing program 3: 06:10:30 executing program 1: 06:10:30 executing program 2: [ 974.549202][T25645] devpts: called with bogus options 06:10:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x0, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e0000", @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) 06:10:30 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) setresgid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:30 executing program 3: 06:10:30 executing program 2: 06:10:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:30 executing program 1: [ 974.881833][T25663] devpts: called with bogus options 06:10:30 executing program 3: 06:10:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e0000", @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) 06:10:30 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 06:10:30 executing program 2: 06:10:30 executing program 1: 06:10:30 executing program 3: [ 975.293637][T25687] devpts: called with bogus options [ 975.323167][ T27] kauditd_printk_skb: 16 callbacks suppressed 06:10:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00000000000000", @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) 06:10:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 975.323189][ T27] audit: type=1804 audit(1580623831.003:353): pid=25687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/480/file0" dev="sda1" ino=16755 res=1 06:10:31 executing program 2: 06:10:31 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 975.448197][T25696] __nla_validate_parse: 4 callbacks suppressed [ 975.448208][T25696] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) 06:10:31 executing program 1: 06:10:31 executing program 3: [ 975.592190][ T27] audit: type=1804 audit(1580623831.013:354): pid=25687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/480/file0" dev="sda1" ino=16755 res=1 [ 975.619933][T25700] devpts: called with bogus options 06:10:31 executing program 2: 06:10:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00000000000000", @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) [ 975.721378][ T27] audit: type=1804 audit(1580623831.343:355): pid=25700 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/481/file0" dev="sda1" ino=16752 res=1 06:10:31 executing program 1: 06:10:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) 06:10:31 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socket$key(0xf, 0x3, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r5 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 975.831940][ T27] audit: type=1804 audit(1580623831.343:356): pid=25700 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/481/file0" dev="sda1" ino=16752 res=1 06:10:31 executing program 3: [ 975.888199][T25717] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:31 executing program 2: [ 975.976371][T25721] devpts: called with bogus options 06:10:31 executing program 1: 06:10:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) [ 976.012433][ T27] audit: type=1804 audit(1580623831.693:357): pid=25721 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/482/file0" dev="sda1" ino=16759 res=1 06:10:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00000000000000", @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) [ 976.108104][ T27] audit: type=1804 audit(1580623831.733:358): pid=25721 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/482/file0" dev="sda1" ino=16759 res=1 06:10:31 executing program 3: 06:10:31 executing program 1: 06:10:31 executing program 2: 06:10:31 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) fchdir(0xffffffffffffffff) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 976.290941][T25737] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:32 executing program 1: [ 976.401636][T25743] devpts: called with bogus options 06:10:32 executing program 3: 06:10:32 executing program 2: 06:10:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x0, 0x0) 06:10:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/18, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) [ 976.423024][ T27] audit: type=1804 audit(1580623832.103:359): pid=25743 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/483/file0" dev="sda1" ino=16779 res=1 06:10:32 executing program 2: 06:10:32 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) fchdir(0xffffffffffffffff) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 976.591332][T25750] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:32 executing program 3: 06:10:32 executing program 1: 06:10:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x0, 0x0) 06:10:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/18, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) [ 976.814879][T25763] devpts: called with bogus options 06:10:32 executing program 2: [ 976.854323][ T27] audit: type=1804 audit(1580623832.533:360): pid=25763 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/484/file0" dev="sda1" ino=16736 res=1 06:10:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000008c0), 0x10) r0 = openat$full(0xffffffffffffff9c, 0x0, 0xc0000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="80000000150088022bbd7000fbdbdf250a0008c8", @ANYRES32, @ANYBLOB="14000600660000000500000074100000010100000800080000040000080008000400000014000200fe80000000000000000000000000003a080008008801000014000200ff0200000000000000000400000000011400010000000000000000000000ffffac1e0001"], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) semtimedop(0x0, &(0x7f0000000140)=[{0x1, 0x4, 0x800}, {0x4, 0x4, 0x800}, {0x3, 0x2, 0x1000}, {0x1, 0x5}, {0x0, 0x79, 0x1800}, {0x1, 0xfffd, 0x1800}, {0x2, 0x8e}, {0x0, 0x2, 0x1000}, {0x3, 0xdcf, 0x1000}], 0x9, &(0x7f0000000340)) r2 = getuid() r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$link(0x8, r4, r3) keyctl$get_persistent(0x16, r2, r3) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1c9, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x0, "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"}) socket$inet(0x2, 0x1007, 0x6) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) listen(r1, 0x10001) r6 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf401, @loopback}], 0x1c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r7) ioctl$BINDER_SET_MAX_THREADS(r7, 0x40046205, &(0x7f0000000380)=0x3) [ 976.913394][T25771] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:32 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) fchdir(0xffffffffffffffff) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:32 executing program 1: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000280)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "36a4f271"}}) 06:10:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x0, 0x0) 06:10:32 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'erspan0\x00'}) 06:10:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/18, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) [ 977.149973][T25780] devpts: called with bogus options [ 977.183590][ T27] audit: type=1804 audit(1580623832.863:361): pid=25780 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/485/file0" dev="sda1" ino=16736 res=1 [ 977.299392][T25794] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:33 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) r2 = socket$inet6(0xa, 0x400000000005, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0x100000001) sendfile(r2, r4, 0x0, 0x80001d00c0d0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 06:10:33 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:33 executing program 1: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000280)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "36a4f271"}}) 06:10:33 executing program 2: syz_emit_ethernet(0x192, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)={0x0, 0x2, [0x0, 0xf46]}) 06:10:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000008c0), 0x10) r0 = openat$full(0xffffffffffffff9c, 0x0, 0xc0000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="80000000150088022bbd7000fbdbdf250a0008c8", @ANYRES32, @ANYBLOB="14000600660000000500000074100000010100000800080000040000080008000400000014000200fe80000000000000000000000000003a080008008801000014000200ff0200000000000000000400000000011400010000000000000000000000ffffac1e0001"], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) semtimedop(0x0, &(0x7f0000000140)=[{0x1, 0x4, 0x800}, {0x4, 0x4, 0x800}, {0x3, 0x2, 0x1000}, {0x1, 0x5}, {0x0, 0x79, 0x1800}, {0x1, 0xfffd, 0x1800}, {0x2, 0x8e}, {0x0, 0x2, 0x1000}, {0x3, 0xdcf, 0x1000}], 0x9, &(0x7f0000000340)) r2 = getuid() r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$link(0x8, r4, r3) keyctl$get_persistent(0x16, r2, r3) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1c9, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x0, "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"}) socket$inet(0x2, 0x1007, 0x6) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) listen(r1, 0x10001) r6 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf401, @loopback}], 0x1c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r7) ioctl$BINDER_SET_MAX_THREADS(r7, 0x40046205, &(0x7f0000000380)=0x3) 06:10:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/19, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) [ 977.541427][T25807] devpts: called with bogus options [ 977.569653][ T27] audit: type=1804 audit(1580623833.253:362): pid=25807 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/486/file0" dev="sda1" ino=16761 res=1 06:10:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000008c0), 0x10) r0 = openat$full(0xffffffffffffff9c, 0x0, 0xc0000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="80000000150088022bbd7000fbdbdf250a0008c8", @ANYRES32, @ANYBLOB="14000600660000000500000074100000010100000800080000040000080008000400000014000200fe80000000000000000000000000003a080008008801000014000200ff0200000000000000000400000000011400010000000000000000000000ffffac1e0001"], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) semtimedop(0x0, &(0x7f0000000140)=[{0x1, 0x4, 0x800}, {0x4, 0x4, 0x800}, {0x3, 0x2, 0x1000}, {0x1, 0x5}, {0x0, 0x79, 0x1800}, {0x1, 0xfffd, 0x1800}, {0x2, 0x8e}, {0x0, 0x2, 0x1000}, {0x3, 0xdcf, 0x1000}], 0x9, &(0x7f0000000340)) r2 = getuid() r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$link(0x8, r4, r3) keyctl$get_persistent(0x16, r2, r3) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1c9, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x0, "73e6cb30a542e6ab78f8d3f8c39d35663d8e2584aade329a1ddd2f276e820fe24c3a886c73aaa755b853cd8f24972940f5dda898f18d2b7d9da1347b7a773f9c08ca42f8843146de8429cede0b1e6150613f3c3b6dfc27d05bda61af070e2ea3cf9d4e664bdba6aeb198a3e81aace611bfa383161b607d6d3e50d4382438e3f7d4c41c2348236fae73c4d4b55a72bcb3906736fbea9078f1ff541045958c7127c8d72b67b7d03bf0768767ef80d1098eee922b25ea277c16de4094de96c7d81c984c963a3d390e371bb87a1f3280baae9335234e53954faea2eb24215921bd556ee747df38a6ee98bd4a107d0b986eb4a07d5e7499c7859fc46559a4077a61a4"}) socket$inet(0x2, 0x1007, 0x6) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) listen(r1, 0x10001) r6 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf401, @loopback}], 0x1c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r7) ioctl$BINDER_SET_MAX_THREADS(r7, 0x40046205, &(0x7f0000000380)=0x3) 06:10:33 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:33 executing program 2: syz_emit_ethernet(0x192, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)={0x0, 0x2, [0x0, 0xf46]}) [ 977.722717][T25916] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 977.809531][T25922] devpts: called with bogus options 06:10:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000008c0), 0x10) r0 = openat$full(0xffffffffffffff9c, 0x0, 0xc0000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="80000000150088022bbd7000fbdbdf250a0008c8", @ANYRES32, @ANYBLOB="14000600660000000500000074100000010100000800080000040000080008000400000014000200fe80000000000000000000000000003a080008008801000014000200ff0200000000000000000400000000011400010000000000000000000000ffffac1e0001"], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) semtimedop(0x0, &(0x7f0000000140)=[{0x1, 0x4, 0x800}, {0x4, 0x4, 0x800}, {0x3, 0x2, 0x1000}, {0x1, 0x5}, {0x0, 0x79, 0x1800}, {0x1, 0xfffd, 0x1800}, {0x2, 0x8e}, {0x0, 0x2, 0x1000}, {0x3, 0xdcf, 0x1000}], 0x9, &(0x7f0000000340)) r2 = getuid() r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$link(0x8, r4, r3) keyctl$get_persistent(0x16, r2, r3) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1c9, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x0, "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"}) socket$inet(0x2, 0x1007, 0x6) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) listen(r1, 0x10001) r6 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf401, @loopback}], 0x1c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r7) ioctl$BINDER_SET_MAX_THREADS(r7, 0x40046205, &(0x7f0000000380)=0x3) 06:10:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)=0x50d060000) mbind(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) 06:10:33 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/19, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) 06:10:33 executing program 3: memfd_create(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 978.189539][T26039] devpts: called with bogus options [ 978.201461][T26065] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)=0x50d060000) mbind(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) 06:10:34 executing program 3: memfd_create(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 978.271881][T26144] xt_TCPMSS: Only works on TCP SYN packets 06:10:34 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:34 executing program 1: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x145) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000100)='bfs\x00', &(0x7f0000000440)='./file0\x00', 0x40, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000480)="46a4d81d512662f5d2b80cdc4649c6b29d61cbbefc21eb5004427dc45bd08da6c0811980cf09c2023001e5611ae59f8a4338591c6b8f2fef8b8ff0e53b29514d2fbd07e24f604dc0835cd32dee18efe9f684f857847f15a2d10d20446216368a596d40881d3b78a59d15a4c8404b236f5118fbc328c7c1d11eaaee", 0x7b, 0x6}, {0x0, 0x0, 0xfffffffffffffe00}, {&(0x7f0000000540)="657bc9ec7e0ab14be84a87a3c49f735f59e565416d651a718d92151c2bc5ed1961172038ce17080316a2d92955ef4cb9ec495b3bfcbf5253ffd6afa6df975f60a613ec5952f3771874de7f4abc73bd9007d62d8f7663251b4cba8af92ecb17858c69995f584287c58c6388b1270668106bade4d701e14b83e517f49bbb9af0ab0ed193c1bfd5a6376295880cbf8326685b82d71df43f20ea72627e118b503e7162982b3de1852d8e69bd2bd9418909520a041e9b81b01b17374516b8c32c174d28", 0xc1, 0x200}, {&(0x7f00000006c0), 0x0, 0x400000}], 0x800000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(r0, 0x402, 0x28) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, &(0x7f00000001c0)) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0xfffffffffffffff5, 0x8, {0x100000000, 0x1, 0x0, {0x6, 0xffffffffffffffdd, 0x80000000, 0x7, 0x3, 0xfff, 0xffff, 0x80000001, 0x9, 0x7b0, 0x5, 0x0, 0x0, 0x10001, 0x200}}}, 0x78) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x39, 0x4023, 0x11}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0xffffffff]) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000008c0), &(0x7f0000000900)=0x4) 06:10:34 executing program 3: memfd_create(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x4c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011003b0e00"/19, @ANYRES32=r4, @ANYBLOB="0000000004000002"], 0x3}}, 0x0) [ 978.464796][T26152] xt_TCPMSS: Only works on TCP SYN packets [ 978.564395][T26160] devpts: called with bogus options 06:10:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setrlimit(0x0, &(0x7f0000000340)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 978.611643][T26163] xt_TCPMSS: Only works on TCP SYN packets [ 978.661261][T26190] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:10:34 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[]}}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x145) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(r0, 0x402, 0x28) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f00000001c0)) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000180)=[0xffffffff]) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x4000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'erspan0\x00'}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) 06:10:34 executing program 3: memfd_create(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:34 executing program 3: memfd_create(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:34 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:34 executing program 1: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x145) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000100)='bfs\x00', &(0x7f0000000440)='./file0\x00', 0x40, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000480)="46a4d81d512662f5d2b80cdc4649c6b29d61cbbefc21eb5004427dc45bd08da6c0811980cf09c2023001e5611ae59f8a4338591c6b8f2fef8b8ff0e53b29514d2fbd07e24f604dc0835cd32dee18efe9f684f857847f15a2d10d20446216368a596d40881d3b78a59d15a4c8404b236f5118fbc328c7c1d11eaaee", 0x7b, 0x6}, {0x0, 0x0, 0xfffffffffffffe00}, {&(0x7f0000000540)="657bc9ec7e0ab14be84a87a3c49f735f59e565416d651a718d92151c2bc5ed1961172038ce17080316a2d92955ef4cb9ec495b3bfcbf5253ffd6afa6df975f60a613ec5952f3771874de7f4abc73bd9007d62d8f7663251b4cba8af92ecb17858c69995f584287c58c6388b1270668106bade4d701e14b83e517f49bbb9af0ab0ed193c1bfd5a6376295880cbf8326685b82d71df43f20ea72627e118b503e7162982b3de1852d8e69bd2bd9418909520a041e9b81b01b17374516b8c32c174d28", 0xc1, 0x200}, {&(0x7f00000006c0), 0x0, 0x400000}], 0x800000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(r0, 0x402, 0x28) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, &(0x7f00000001c0)) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0xfffffffffffffff5, 0x8, {0x100000000, 0x1, 0x0, {0x6, 0xffffffffffffffdd, 0x80000000, 0x7, 0x3, 0xfff, 0xffff, 0x80000001, 0x9, 0x7b0, 0x5, 0x0, 0x0, 0x10001, 0x200}}}, 0x78) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x39, 0x4023, 0x11}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0xffffffff]) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000008c0), &(0x7f0000000900)=0x4) [ 978.776728][T26374] xt_TCPMSS: Only works on TCP SYN packets 06:10:34 executing program 5: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) newfstatat(0xffffffffffffff9c, &(0x7f00000028c0)='./file0/file0\x00', &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r5, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() r9 = gettid() tkill(r9, 0x0) r10 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000002b40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b80)={0x0, 0x0, 0x0}, &(0x7f0000002bc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r3, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000880)="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", 0xfd8}, {&(0x7f0000001880)="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", 0xff0}, {&(0x7f0000000340)="cf80ee8405d61e5f5ff50eb232959dc8f0f0299f0996594d1c28f3fa53d81f7351f00608bac70ba27ac4004a9ccd6f3760b7177b71bbbd8ef1497a5df7ecf87ed230d913f2007e0fa0448d811da205defbe2eede032037abefc896671d82844d689967d321860abe907cb91c74eb5b62276dc4c37a2b8d3745bd76f626c69890bdc380d566d5cec7faed38315f793555b0faa4bb329eee6cda334b5c667c7fae81608f330cb6253a3e0440ef8d5527a3857383cc2693f69d8f629dfcf84721", 0xbf}, {&(0x7f00000002c0)="3bf55cf5d68d5fac1f592143a81ea3dbd5ef4ea1b59bd35bd19f394b5952", 0x1e}], 0x4, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{&(0x7f00000004c0)="c21f68f1bb122678ba9a1c190a6d6f5e711d4871fffb72bc3a787766584c16c70167c21a848207fd7136ec05942900037ddd7ae0c1fb5acf2b7b2226e880d837795cd1609c1d7cc9e332cca90d0d17a99cfd4a47e14371503d43048c24fa441e893eacda21681c01af926ae5c99b097687d2257cc68d1b2e8fdd616a3bf133cdd882e41bb3643e04980b66502af1284450a8a660d410e6680e1955d4413b3c87a0202571417bf3050203ff0b42dca5e45edaf1fa66a1d983239a051ac64bd24b7ca064b612b272557dd879b9fb", 0xcd}, {&(0x7f00000005c0)="5c3154210d74f3e988331b7e7e35db2bc9d5649667e727a1102226a8e70fc1c1d52384f2da0e6d7f6a60d60b4d46bb6cb9fdcf28c585f26561a8ac2a2bf3e3e4194264a97b0af1bf6377b848c8db2fc7b5a38045563a8a7b36372ddd", 0x5c}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf3", 0xcc}], 0x4, &(0x7f0000002d40)=[@cred={{0x1c, 0x1, 0x2, {r1, r4, r5}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r2, r13, r14}}}], 0x98, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {0x0}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b749926930592", 0xb3}], 0x4, &(0x7f0000003080), 0x0, 0x4000000}], 0x3, 0x40000) r15 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r15, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$link(0x8, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) write(r16, &(0x7f0000000340), 0x41395527) pipe(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000000c0)={0x2, 'team_slave_1\x00', {0x20}}) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = socket$inet(0x10, 0x3, 0x0) sendmsg(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:34 executing program 3: memfd_create(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)=0x50d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) mbind(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) [ 978.983250][T26426] devpts: called with bogus options [ 979.022451][T26385] devpts: called with bogus options 06:10:34 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[]}}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x145) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(r0, 0x402, 0x28) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f00000001c0)) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000180)=[0xffffffff]) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x4000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'erspan0\x00'}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) 06:10:34 executing program 3: memfd_create(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:34 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x73, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) 06:10:34 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:35 executing program 3: memfd_create(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)=0x50d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) mbind(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) [ 979.356277][T26514] devpts: called with bogus options 06:10:35 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:10:35 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[]}}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x145) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(r0, 0x402, 0x28) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f00000001c0)) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000180)=[0xffffffff]) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x4000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'erspan0\x00'}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) 06:10:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000008c0), 0x10) r0 = openat$full(0xffffffffffffff9c, 0x0, 0xc0000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="80000000150088022bbd7000fbdbdf250a0008c8", @ANYRES32, @ANYBLOB="14000600660000000500000074100000010100000800080000040000080008000400000014000200fe8000"/52], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x4, 0x800}, {0x3, 0x2, 0x1000}, {0x1, 0x5}, {0x0, 0x79, 0x1800}, {0x1, 0xfffd, 0x1800}, {0x2, 0x8e}, {0x0, 0x2, 0x1000}, {0x3, 0xdcf, 0x1000}], 0x8, &(0x7f0000000340)) r2 = getuid() r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$link(0x8, r4, r3) keyctl$get_persistent(0x16, r2, r3) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1c9, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x0, "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"}) socket$inet(0x2, 0x1007, 0x6) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) listen(r1, 0x10001) r5 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf401, @loopback}], 0x1c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r6, 0x40046205, &(0x7f0000000380)=0x3) [ 979.545981][T26522] xt_TCPMSS: Only works on TCP SYN packets 06:10:35 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5415, 0x719000) 06:10:35 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:35 executing program 3: memfd_create(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000008c0), 0x10) r0 = openat$full(0xffffffffffffff9c, 0x0, 0xc0000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="80000000150088022bbd7000fbdbdf250a0008c8", @ANYRES32, @ANYBLOB="14000600660000000500000074100000010100000800080000040000080008000400000014000200fe8000"/52], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x4, 0x800}, {0x3, 0x2, 0x1000}, {0x1, 0x5}, {0x0, 0x79, 0x1800}, {0x1, 0xfffd, 0x1800}, {0x2, 0x8e}, {0x0, 0x2, 0x1000}, {0x3, 0xdcf, 0x1000}], 0x8, &(0x7f0000000340)) r2 = getuid() r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$link(0x8, r4, r3) keyctl$get_persistent(0x16, r2, r3) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1c9, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x0, "73e6cb30a542e6ab78f8d3f8c39d35663d8e2584aade329a1ddd2f276e820fe24c3a886c73aaa755b853cd8f24972940f5dda898f18d2b7d9da1347b7a773f9c08ca42f8843146de8429cede0b1e6150613f3c3b6dfc27d05bda61af070e2ea3cf9d4e664bdba6aeb198a3e81aace611bfa383161b607d6d3e50d4382438e3f7d4c41c2348236fae73c4d4b55a72bcb3906736fbea9078f1ff541045958c7127c8d72b67b7d03bf0768767ef80d1098eee922b25ea277c16de4094de96c7d81c984c963a3d390e371bb87a1f3280baae9335234e53954faea2eb24215921bd556ee747df38a6ee98bd4a107d0b986eb4a07d5e7499c7859fc46559a4077a61a4"}) socket$inet(0x2, 0x1007, 0x6) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) listen(r1, 0x10001) r5 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf401, @loopback}], 0x1c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r6, 0x40046205, &(0x7f0000000380)=0x3) 06:10:35 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000200)="d43bb4185658b15e90ad7ceed2ae05e0729484a3898e62c1dccca657492b64eed3f663b94d04e94ee6bafb67aea02807", 0x30}, {&(0x7f0000000380)="824bd31c4fa03743b2ab1311eb27fba318c212ec77042663c85708f63db6f63d788abbf9d3ac2997d48528111c307660c28ef1dc6d43cb20197395d54d5d50daa1785901169848ea8b47b46e", 0x4c}, {&(0x7f0000000040)="e664402718d98de9fc765a685f7048196abf9fec293f4ccd7183e39abf431ddd15608216d76b593fe6e95f2b4609ad6d88f23f38f63d1abb7d5e345f0694ba4263900daaf6a6e6d86acd983ba86df6dea7aaf46a9609a079706ceb3f2441a274b7fb34a9a5f6fef958ec5e46fb27de26ace8384c0b112427a8adcf49307f88b59ce9a9f442f408b32d947cc0d89865f2c8748dda7e13b2d6dc55d9deeebd4e02", 0xa0}, {&(0x7f0000003340)="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", 0x1c9}], 0x4, 0x0, 0x0, 0xffffffe0}}], 0x3, 0x24004000) 06:10:35 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:10:35 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0xa401, &(0x7f0000000300)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, 'mountinfo\x00'}}]}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$setregs(0xf, r0, 0x0, &(0x7f00000002c0)="6fd30f39ce") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0, 0x10}) [ 979.877123][T26639] xt_TCPMSS: Only works on TCP SYN packets [ 979.891671][T26647] devpts: called with bogus options [ 979.913531][T26643] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:10:35 executing program 3: memfd_create(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:35 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) timer_delete(0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x4c, 0x0, 0x3e) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:10:35 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5415, 0x719000) [ 980.100259][T26854] xt_TCPMSS: Only works on TCP SYN packets 06:10:35 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@fat=@codepage={'codepage', 0x3d, '857'}}]}) [ 980.219316][T26921] devpts: called with bogus options 06:10:35 executing program 1: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x145) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f000001b0c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db0700000068000a0100000000"], 0x2a) fcntl$notify(r0, 0x402, 0x28) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f00000001c0)) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000180)=[0xffffffff]) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x4000001) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'erspan0\x00'}) 06:10:35 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x21, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 980.311281][T26928] FAT-fs (loop4): bogus number of reserved sectors [ 980.318730][T26928] FAT-fs (loop4): Can't find a valid FAT filesystem [ 980.368386][T26928] FAT-fs (loop4): bogus number of reserved sectors [ 980.383349][T26928] FAT-fs (loop4): Can't find a valid FAT filesystem 06:10:36 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$inet6(0xa, 0x400000000005, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) sched_setscheduler(0x0, 0x0, &(0x7f00000001c0)) ptrace(0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080), 0x8) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000100)={0x0, 0x0, 0x3f, 0x7ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000180)=0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0x100000001) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x8482) [ 980.446962][T26927] kvm: emulating exchange as write 06:10:36 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:36 executing program 4: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x20) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() r7 = gettid() tkill(r7, 0x0) r8 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) sendmmsg$unix(r3, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000880)="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", 0xfd8}, {&(0x7f0000001880)="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", 0xff0}, {&(0x7f0000000340)="cf80ee8405d61e5f5ff50eb232959dc8f0f0299f0996594d1c28f3fa53d81f7351f00608bac70ba27ac4004a9ccd6f3760b7177b71bbbd8ef1497a5df7ecf87ed230d913f2007e0fa0448d811da205defbe2eede032037abefc896671d82844d689967d321860abe907cb91c74eb5b62276dc4c37a2b8d3745bd76f626c69890bdc380d566d5cec7faed38315f793555b0faa4bb329eee6cda334b5c667c7fae81608f330cb6253a3e0440ef8d5527a3857383cc2693f69d8f629dfcf84721", 0xbf}, {&(0x7f00000002c0)="3bf55cf5d68d5fac1f592143a81ea3dbd5ef4ea1b59bd35bd19f394b5952", 0x1e}], 0x4, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{&(0x7f00000004c0)="c21f68f1bb122678ba9a1c190a6d6f5e711d4871fffb72bc3a787766584c16c70167c21a848207fd7136ec05942900037ddd7ae0c1fb5acf2b7b2226e880d837795cd1609c1d7cc9e332cca90d0d17a99cfd4a47e14371503d43048c24fa441e893eacda21681c01af926ae5c99b097687d2257cc68d1b2e8fdd616a3bf133cdd882e41bb3643e04980b66502af1284450a8a660d410e6680e1955d4413b3c87a0202571417bf3050203ff0b42dca5e45edaf1fa66a1d983239a051ac64bd24b7ca064b612b272557dd879b9fb", 0xcd}, {&(0x7f00000005c0)="5c3154210d74f3e988331b7e7e35db2bc9d5649667e727a1102226a8e70fc1c1d52384f2da0e6d7f6a60d60b4d46bb6cb9fdcf28c585f26561a8ac2a2bf3e3e4194264a97b0af1bf6377b848c8db2fc7b5a38045563a8a7b36372ddd", 0x5c}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf3", 0xcc}], 0x4, &(0x7f0000002d40)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, r4}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r9}}}, @cred={{0x1c, 0x1, 0x2, {r2, r10}}}], 0x98, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {0x0}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b749926930592", 0xb3}], 0x4, &(0x7f0000003080), 0x0, 0x4000000}], 0x3, 0x40000) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$link(0x8, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) write(r11, &(0x7f0000000340), 0x41395527) pipe(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000000c0)={0x2, 'team_slave_1\x00', {0x20}}) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = socket$inet(0x10, 0x3, 0x0) sendmsg(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 980.563293][T26941] xt_TCPMSS: Only works on TCP SYN packets 06:10:36 executing program 5: ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) r0 = socket$unix(0x1, 0x10000000000001, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f0000000400)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x25) listen(r0, 0x0) r1 = accept$unix(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x5452, &(0x7f0000000000)={0x1, 'ip6gretap0\x00', {}, 0xfffc}) 06:10:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) timer_delete(0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x4c, 0x0, 0x3e) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:10:36 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 980.752857][ T27] kauditd_printk_skb: 13 callbacks suppressed [ 980.752945][ T27] audit: type=1804 audit(1580623836.433:376): pid=27002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir443183920/syzkaller.f5lAvH/564/bus" dev="sda1" ino=16714 res=1 06:10:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KDMKTONE(r1, 0x541b, 0x20000004) 06:10:36 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:36 executing program 5: gettid() clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0xfff9}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) semop(0x0, 0x0, 0x0) 06:10:36 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$inet6(0xa, 0x400000000005, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) sched_setscheduler(0x0, 0x0, &(0x7f00000001c0)) ptrace(0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080), 0x8) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000100)={0x0, 0x0, 0x3f, 0x7ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000180)=0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0x100000001) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x8482) 06:10:36 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$inet6(0xa, 0x400000000005, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) sched_setscheduler(0x0, 0x0, &(0x7f00000001c0)) ptrace(0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080), 0x8) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000100)={0x0, 0x0, 0x3f, 0x7ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000180)=0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0x100000001) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x8482) 06:10:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 981.074059][T27369] xt_TCPMSS: Only works on TCP SYN packets [ 981.129617][T27374] devpts: called with bogus options [ 981.159701][ T27] audit: type=1804 audit(1580623836.843:377): pid=27374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/495/file0" dev="sda1" ino=16627 res=1 06:10:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xfff3}}}, 0x24}}, 0x0) 06:10:37 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 981.273499][ T27] audit: type=1804 audit(1580623836.883:378): pid=27374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/495/file0" dev="sda1" ino=16627 res=1 [ 981.300156][T27384] xt_TCPMSS: Only works on TCP SYN packets 06:10:37 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:37 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x4}) [ 981.523352][T27402] devpts: called with bogus options [ 981.528904][ T27] audit: type=1804 audit(1580623837.213:379): pid=27383 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir165095585/syzkaller.G6TeY3/613/bus" dev="sda1" ino=17867 res=1 06:10:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000008c0), 0x10) r0 = openat$full(0xffffffffffffff9c, 0x0, 0xc0000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="80000000150088022bbd7000fbdbdf250a0008c8", @ANYRES32, @ANYBLOB="14000600660000000500000074100000010100000800080000040000080008000400000014000200fe80000000000000000000000000003a080008008801000014000200ff0200000000000000000400000000011400010000000000000000000000ffffac1e00"], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) semtimedop(0x0, &(0x7f0000000140)=[{0x1, 0x4, 0x800}, {0x4, 0x4, 0x800}, {0x3, 0x2, 0x1000}, {0x1, 0x5}, {0x0, 0x79, 0x1800}, {0x1, 0xfffd, 0x1800}, {0x2, 0x8e}, {0x0, 0x2, 0x1000}, {0x3, 0xdcf, 0x1000}], 0x9, &(0x7f0000000340)) r2 = getuid() r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$link(0x8, r4, r3) keyctl$get_persistent(0x16, r2, r3) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1c9, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x0, "73e6cb30a542e6ab78f8d3f8c39d35663d8e2584aade329a1ddd2f276e820fe24c3a886c73aaa755b853cd8f24972940f5dda898f18d2b7d9da1347b7a773f9c08ca42f8843146de8429cede0b1e6150613f3c3b6dfc27d05bda61af070e2ea3cf9d4e664bdba6aeb198a3e81aace611bfa383161b607d6d3e50d4382438e3f7d4c41c2348236fae73c4d4b55a72bcb3906736fbea9078f1ff541045958c7127c8d72b67b7d03bf0768767ef80d1098eee922b25ea277c16de4094de96c7d81c984c963a3d390e371bb87a1f3280baae9335234e53954faea2eb24215921bd556ee747df38a6ee98bd4a107d0b986eb4a07d5e7499c7859fc46559a4077a61a4"}) socket$inet(0x2, 0x1007, 0x6) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) listen(r1, 0x10001) r6 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf401, @loopback}], 0x1c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r7) ioctl$BINDER_SET_MAX_THREADS(r7, 0x40046205, &(0x7f0000000380)=0x3) [ 981.612515][ T27] audit: type=1804 audit(1580623837.213:380): pid=27402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/496/file0" dev="sda1" ino=16627 res=1 06:10:37 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:37 executing program 5: shmctl$IPC_SET(0x0, 0x1, &(0x7f00000002c0)={{0x1}}) 06:10:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000480)='wireguard\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000001380)=ANY=[@ANYBLOB='l\a\x00\x00', @ANYRES16=r1, @ANYBLOB="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"], 0x76c}}, 0x0) [ 981.720431][ T27] audit: type=1804 audit(1580623837.213:381): pid=27402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/496/file0" dev="sda1" ino=16627 res=1 06:10:37 executing program 3: memfd_create(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 981.879920][ T27] audit: type=1804 audit(1580623837.243:382): pid=27377 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir443183920/syzkaller.f5lAvH/565/bus" dev="sda1" ino=17863 res=1 06:10:37 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xfffff4f3, 0x0, 0x0, 0x1d, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 982.032548][ T27] audit: type=1804 audit(1580623837.633:383): pid=27516 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/497/file0" dev="sda1" ino=16813 res=1 06:10:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000d40)={{0x0, 0x0, 0x80}}) 06:10:37 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:37 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af13, &(0x7f0000000180)) [ 982.147106][ T27] audit: type=1804 audit(1580623837.633:384): pid=27516 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/497/file0" dev="sda1" ino=16813 res=1 06:10:37 executing program 3: memfd_create(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:37 executing program 2: keyctl$get_persistent(0x12, 0x0, 0x0) [ 982.339410][ T27] audit: type=1804 audit(1580623838.023:385): pid=27739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir705274475/syzkaller.iPQOXy/498/file0" dev="sda1" ino=16813 res=1 06:10:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000008c0), 0x10) r0 = openat$full(0xffffffffffffff9c, 0x0, 0xc0000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="80000000150088022bbd7000fbdbdf250a0008c8", @ANYRES32, @ANYBLOB="14000600660000000500000074100000010100000800080000040000080008000400000014000200fe80000000000000000000000000003a080008008801000014000200ff0200000000000000000400000000011400010000000000000000000000ffffac1e00"], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) semtimedop(0x0, &(0x7f0000000140)=[{0x1, 0x4, 0x800}, {0x4, 0x4, 0x800}, {0x3, 0x2, 0x1000}, {0x1, 0x5}, {0x0, 0x79, 0x1800}, {0x1, 0xfffd, 0x1800}, {0x2, 0x8e}, {0x0, 0x2, 0x1000}, {0x3, 0xdcf, 0x1000}], 0x9, &(0x7f0000000340)) r2 = getuid() r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$link(0x8, r4, r3) keyctl$get_persistent(0x16, r2, r3) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1c9, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x0, "73e6cb30a542e6ab78f8d3f8c39d35663d8e2584aade329a1ddd2f276e820fe24c3a886c73aaa755b853cd8f24972940f5dda898f18d2b7d9da1347b7a773f9c08ca42f8843146de8429cede0b1e6150613f3c3b6dfc27d05bda61af070e2ea3cf9d4e664bdba6aeb198a3e81aace611bfa383161b607d6d3e50d4382438e3f7d4c41c2348236fae73c4d4b55a72bcb3906736fbea9078f1ff541045958c7127c8d72b67b7d03bf0768767ef80d1098eee922b25ea277c16de4094de96c7d81c984c963a3d390e371bb87a1f3280baae9335234e53954faea2eb24215921bd556ee747df38a6ee98bd4a107d0b986eb4a07d5e7499c7859fc46559a4077a61a4"}) socket$inet(0x2, 0x1007, 0x6) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) listen(r1, 0x10001) r6 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf401, @loopback}], 0x1c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r7) ioctl$BINDER_SET_MAX_THREADS(r7, 0x40046205, &(0x7f0000000380)=0x3) 06:10:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) geteuid() r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1dcd}]}]}, 0x20}}, 0x0) 06:10:38 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:38 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$get_persistent(0x16, 0x0, r1) 06:10:38 executing program 1: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) 06:10:38 executing program 3: memfd_create(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0x41a0ae8d, &(0x7f0000000d40)={{0x0, 0x0, 0x80}}) 06:10:38 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000300)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "029200", 0x14, 0x2b, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 06:10:38 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:38 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:38 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:38 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x10094) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYRES16=0x0, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYPTR64, @ANYPTR=&(0x7f0000000700)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYRESDEC=0x0, @ANYRESHEX, @ANYRESDEC, @ANYBLOB="e47e6d21f32a8aeb65365c54f972e7c2902bc0f68f797185f8765f5c2bd081734f6384ba364971c61be8b09843b60e04660fda3845934c6fc73ea87146955a609465704cfbc6e5d42d0a6171a2d8e9b240b86afa6e1c8ef02b91a424e93726b32c3fe24c325e7c8ffc06fa112b800653bdc003205bebd560d204a227fabad5c7f3af5d2828ba62bff95f796d2eecf3318952023ec24bf7813bb3d495bf7fb107a4bb686b4f5c33d16c6cd817f0fba783505c062c1c66afa9ac0d8bfbbcc50f5bcab20906dbaff2491e69e9e03f5a05f12ab1", @ANYRES16, @ANYRESHEX], @ANYRES32, @ANYRESOCT], @ANYRES16, @ANYRES64=0x0, @ANYBLOB="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"], 0x10523) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8e"], 0xfdef) 06:10:38 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000300)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "029200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 06:10:38 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 06:10:38 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:38 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/igmp\x00') ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000280)) semget(0x0, 0x3, 0x4c0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000012c0)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000340)='auxv\x00') read$eventfd(r2, &(0x7f00000000c0), 0x2c3) readv(r2, &(0x7f0000000040), 0x20000000000001e7) flock(r2, 0xa) socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000f, 0xa013, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x13, 0x5, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5442f7e4, 0x2, @perf_bp={&(0x7f0000000180), 0x7}, 0x3008f}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) prlimit64(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket(0xa, 0x2, 0x0) tee(0xffffffffffffffff, r0, 0x7fffffff, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=ANY=[]}, 0x78) bind$inet(r4, &(0x7f0000000300)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000001300)=""/32) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0xa3, 0x4, 0x100000001, 0x0, r5}, 0x2c) clone(0x800000000b000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r6, &(0x7f00000002c0)}, 0x10) 06:10:39 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 06:10:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 06:10:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b200080000001028e6c467144d2fa833"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0xf000, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x54, 0x2c, 0xd27, 0x60, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x8}, '\x00'}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x401}}]}]}}]}, 0x54}}, 0x0) [ 983.428285][T28101] devpts: called with bogus options 06:10:39 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 06:10:39 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:39 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 06:10:39 executing program 4: open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000140)="295ee1311f16f477671070") r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$inet6(0xa, 0x80000, 0x7fff) ioctl(r4, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x21d) getegid() r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) r7 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$TIPC_CONN_TIMEOUT(r6, 0x10f, 0x82, &(0x7f0000000100), &(0x7f00000002c0)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x5, 0x1, 0x0, 0x0, 0x8, 0x1, 0x4}, 0x20) r8 = getpid() accept4$unix(r6, &(0x7f0000000300)=@abs, &(0x7f00000003c0)=0xffffff50, 0x0) ptrace$getregs(0xe, r8, 0x250, &(0x7f0000000200)=""/93) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0x5c) 06:10:39 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af04, 0x0) [ 983.762876][T28280] devpts: called with bogus options 06:10:39 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 06:10:39 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/handlers\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 06:10:39 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:39 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x278, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2d8) 06:10:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$get_persistent(0x16, 0x0, r1) 06:10:39 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x278, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2d8) 06:10:39 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/handlers\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 06:10:39 executing program 4: open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000140)="295ee1311f16f477671070") r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$inet6(0xa, 0x80000, 0x7fff) ioctl(r4, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x21d) getegid() r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) r7 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$TIPC_CONN_TIMEOUT(r6, 0x10f, 0x82, &(0x7f0000000100), &(0x7f00000002c0)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x5, 0x1, 0x0, 0x0, 0x8, 0x1, 0x4}, 0x20) r8 = getpid() accept4$unix(r6, &(0x7f0000000300)=@abs, &(0x7f00000003c0)=0xffffff50, 0x0) ptrace$getregs(0xe, r8, 0x250, &(0x7f0000000200)=""/93) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0x5c) 06:10:39 executing program 5: semop(0x0, &(0x7f0000000200)=[{}], 0x1) 06:10:39 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:40 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r1, 0x0, 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xfffff4f3, 0x0, 0x0, 0x1d, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 06:10:40 executing program 1: 06:10:40 executing program 4: open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000140)="295ee1311f16f477671070") r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$inet6(0xa, 0x80000, 0x7fff) ioctl(r4, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x21d) getegid() r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) r7 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$TIPC_CONN_TIMEOUT(r6, 0x10f, 0x82, &(0x7f0000000100), &(0x7f00000002c0)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x5, 0x1, 0x0, 0x0, 0x8, 0x1, 0x4}, 0x20) r8 = getpid() accept4$unix(r6, &(0x7f0000000300)=@abs, &(0x7f00000003c0)=0xffffff50, 0x0) ptrace$getregs(0xe, r8, 0x250, &(0x7f0000000200)=""/93) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0x5c) 06:10:40 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x278, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2d8) 06:10:40 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000000000), 0x4) sendto(r0, &(0x7f0000000100)="a2c81bf89d543af8", 0x8, 0x0, &(0x7f0000000380)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 06:10:40 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:40 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000180)={'macvlan0\x00', {0x2, 0x0, @multicast1}}) socket(0x0, 0x0, 0x0) 06:10:40 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:40 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self\x00', 0x0, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 06:10:40 executing program 4: open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000140)="295ee1311f16f477671070") r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$inet6(0xa, 0x80000, 0x7fff) ioctl(r4, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x21d) getegid() r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) r7 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$TIPC_CONN_TIMEOUT(r6, 0x10f, 0x82, &(0x7f0000000100), &(0x7f00000002c0)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x5, 0x1, 0x0, 0x0, 0x8, 0x1, 0x4}, 0x20) r8 = getpid() accept4$unix(r6, &(0x7f0000000300)=@abs, &(0x7f00000003c0)=0xffffff50, 0x0) ptrace$getregs(0xe, r8, 0x250, &(0x7f0000000200)=""/93) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0x5c) 06:10:40 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000200)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a75cb5", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x82, 0x0, 0x0, 0x0, 0x0, @mcast2}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x0, 0xf46]}) [ 984.838149][T28643] tcpmss_tg6_check: 5 callbacks suppressed [ 984.838155][T28643] xt_TCPMSS: Only works on TCP SYN packets 06:10:40 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") syz_emit_ethernet(0x2e, &(0x7f0000000040)={@broadcast, @empty, @val={@void}, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @link_local, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x0) 06:10:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000d00)='net/igmp\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) sendfile(r2, r0, 0x0, 0x6f0a77bd) 06:10:40 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 06:10:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x20, 0xa, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_HANDLE={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x1900811, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fstatfs(r0, &(0x7f0000000400)=""/128) 06:10:40 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000200)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a75cb5", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x82, 0x0, 0x0, 0x0, 0x0, @mcast2}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x0, 0xf46]}) 06:10:40 executing program 3: memfd_create(0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0xd0, 0xd0, 0xd0, 0x0, 0xd0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 985.172131][T28692] xt_TCPMSS: Only works on TCP SYN packets 06:10:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstatfs(r0, &(0x7f0000000400)=""/128) 06:10:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) bind$unix(r7, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 985.365829][T28837] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 985.408850][T28866] xt_TCPMSS: Only works on TCP SYN packets 06:10:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x12, 0x800, 0x3}, 0x3c) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/199) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) 06:10:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 06:10:41 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:41 executing program 2: [ 985.552737][ T8301] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:10:41 executing program 1: 06:10:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x10001, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) dup(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x10}) write$UHID_INPUT(r0, &(0x7f00000015c0), 0x10000005c) fadvise64(r0, 0x0, 0x0, 0x4) 06:10:41 executing program 4: socket$inet(0x10, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000240)=0xc) syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x10000, 0x80000) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c06639d476", 0xe) accept4(r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x6f0a77bd) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f00000001c0)={r3, 0x3, &(0x7f00000000c0)=[0x800, 0x8, 0x6], &(0x7f0000000100)=[0x0, 0x8e6b, 0x80, 0x3f], 0x11, 0x0, 0x1, &(0x7f0000000140), &(0x7f0000000180)=[0x1f, 0x10, 0x8000, 0x3]}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000600)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0xebe, 0xb6d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000001}}, 0xa0) r4 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x260, 0xf0, 0xf0, 0x0, 0x0, 0xf0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x40000}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 06:10:41 executing program 1: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, 0x0, 0x4000) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fstatfs(r0, &(0x7f0000000400)=""/128) 06:10:41 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:41 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:41 executing program 5: 06:10:41 executing program 1: 06:10:41 executing program 5: 06:10:41 executing program 4: 06:10:42 executing program 1: 06:10:42 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 986.353012][T29350] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:10:42 executing program 5: [ 986.419467][T29350] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 986.518921][T29350] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 986.688436][T29472] attempt to access beyond end of device [ 986.694269][T29472] loop2: rw=1, want=130, limit=128 [ 986.708623][T29472] buffer_io_error: 70 callbacks suppressed [ 986.708638][T29472] Buffer I/O error on dev loop2, logical block 129, lost async page write [ 986.729475][T29142] attempt to access beyond end of device [ 986.735591][T29142] loop2: rw=2049, want=985, limit=128 [ 986.762937][T29472] attempt to access beyond end of device [ 986.773517][T29472] loop2: rw=1, want=131, limit=128 [ 986.782380][T29472] Buffer I/O error on dev loop2, logical block 130, lost async page write [ 986.791254][T29472] attempt to access beyond end of device [ 986.808032][T29472] loop2: rw=1, want=132, limit=128 [ 986.813210][T29472] Buffer I/O error on dev loop2, logical block 131, lost async page write [ 986.829922][T29472] attempt to access beyond end of device [ 986.835848][T29472] loop2: rw=1, want=133, limit=128 [ 986.841499][T29472] Buffer I/O error on dev loop2, logical block 132, lost async page write [ 986.850373][T29472] attempt to access beyond end of device [ 986.856047][T29472] loop2: rw=1, want=142, limit=128 [ 986.861505][T29472] Buffer I/O error on dev loop2, logical block 141, lost async page write [ 986.870314][T29472] attempt to access beyond end of device [ 986.876075][T29472] loop2: rw=1, want=143, limit=128 [ 986.882052][T29472] Buffer I/O error on dev loop2, logical block 142, lost async page write [ 986.890623][T29472] attempt to access beyond end of device [ 986.896253][T29472] loop2: rw=1, want=144, limit=128 [ 986.901436][T29472] Buffer I/O error on dev loop2, logical block 143, lost async page write 06:10:42 executing program 1: 06:10:42 executing program 4: 06:10:42 executing program 5: 06:10:42 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:42 executing program 2: 06:10:42 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 986.910007][T29472] attempt to access beyond end of device [ 986.915686][T29472] loop2: rw=1, want=145, limit=128 [ 986.920835][T29472] Buffer I/O error on dev loop2, logical block 144, lost async page write 06:10:42 executing program 4: 06:10:42 executing program 5: 06:10:42 executing program 1: 06:10:42 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 987.192998][T29483] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:10:42 executing program 1: [ 987.245710][T29483] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:10:43 executing program 4: 06:10:43 executing program 2: 06:10:43 executing program 4: [ 987.368510][T29483] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:43 executing program 5: 06:10:43 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:43 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:43 executing program 1: 06:10:43 executing program 4: 06:10:43 executing program 2: 06:10:43 executing program 5: 06:10:43 executing program 1: 06:10:43 executing program 5: 06:10:43 executing program 4: 06:10:43 executing program 2: 06:10:43 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 987.913288][T29511] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:10:43 executing program 4: [ 987.971150][T29511] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 987.998744][T29511] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:43 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:43 executing program 5: 06:10:43 executing program 1: 06:10:43 executing program 2: 06:10:43 executing program 4: 06:10:43 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:44 executing program 5: 06:10:44 executing program 1: 06:10:44 executing program 2: 06:10:44 executing program 4: 06:10:44 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:44 executing program 5: [ 988.654750][T29549] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 988.688049][T29549] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 988.798430][T29549] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:44 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:44 executing program 1: 06:10:44 executing program 4: 06:10:44 executing program 2: 06:10:44 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:44 executing program 5: 06:10:44 executing program 2: 06:10:44 executing program 1: 06:10:44 executing program 4: 06:10:44 executing program 5: 06:10:44 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:44 executing program 2: [ 989.283467][T29580] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 989.351439][T29580] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 989.362352][T29580] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:45 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:45 executing program 5: 06:10:45 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:45 executing program 1: 06:10:45 executing program 2: 06:10:45 executing program 4: 06:10:45 executing program 1: 06:10:45 executing program 5: 06:10:45 executing program 2: 06:10:45 executing program 4: 06:10:45 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:45 executing program 5: [ 989.911368][T29612] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 989.959997][T29612] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 989.987298][T29612] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:45 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:45 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) r0 = gettid() setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f00000000c0)=""/236, 0x23000}, 0x20) process_vm_writev(r0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/247, 0xfffffdb2}], 0x100000000000007b, &(0x7f0000000040), 0x23a, 0x0) 06:10:45 executing program 1: socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) socket$inet(0xa, 0x801, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, 0x6, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x20040001) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000000)={0x0, 0x4}) gettid() syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000200)) unshare(0x68020600) 06:10:45 executing program 4: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0x0, 0x0) 06:10:45 executing program 5: prctl$PR_SET_DUMPABLE(0x4, 0x1) socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) socket$inet(0xa, 0x801, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x80, 0x6, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000000)={0x0, 0x4}) r1 = gettid() readahead(0xffffffffffffffff, 0x5, 0xf732) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/psched\x00') ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000200)) unshare(0x68020600) 06:10:45 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, 0x0, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:45 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0x2) [ 990.252139][T29633] IPVS: ftp: loaded support on port[0] = 21 06:10:46 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, 0x0, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 990.307582][T29644] IPVS: ftp: loaded support on port[0] = 21 [ 990.326526][ T7920] serio: Serial port tty1 06:10:46 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x7f, 0x4) [ 990.456097][T29646] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 990.480973][T29646] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 990.528239][T29646] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:46 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x7f, 0x4) 06:10:46 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x7f, 0x4) 06:10:46 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 990.775100][T29765] IPVS: ftp: loaded support on port[0] = 21 06:10:46 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, 0x0, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:46 executing program 1: socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) socket$inet(0xa, 0x801, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, 0x6, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x20040001) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000000)={0x0, 0x4}) gettid() syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000200)) unshare(0x68020600) 06:10:46 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x7f, 0x4) [ 990.892301][ T731] tipc: TX() has been purged, node left! [ 991.019327][T29844] IPVS: ftp: loaded support on port[0] = 21 [ 991.105681][T29874] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 991.116377][T29874] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:10:46 executing program 4: prctl$PR_SET_DUMPABLE(0x4, 0x1) socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) socket$inet(0xa, 0x801, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x80, 0x6, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000000)={0x0, 0x4}) r1 = gettid() readahead(0xffffffffffffffff, 0x5, 0xf732) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/psched\x00') ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000200)) unshare(0x68020600) 06:10:46 executing program 5: prctl$PR_SET_DUMPABLE(0x4, 0x1) socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) socket$inet(0xa, 0x801, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x80, 0x6, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000000)={0x0, 0x4}) r1 = gettid() readahead(0xffffffffffffffff, 0x5, 0xf732) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/psched\x00') ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000200)) unshare(0x68020600) [ 991.148983][T29874] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:46 executing program 2: fadvise64(0xffffffffffffffff, 0x7fffffff, 0x7f, 0x4) 06:10:46 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:46 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 991.305309][T29890] IPVS: ftp: loaded support on port[0] = 21 [ 991.364121][T29888] IPVS: ftp: loaded support on port[0] = 21 06:10:47 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:47 executing program 2: fadvise64(0xffffffffffffffff, 0x7fffffff, 0x7f, 0x4) 06:10:47 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x4610, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup3(r2, r3, 0x0) dup2(r1, r4) 06:10:47 executing program 2: fadvise64(0xffffffffffffffff, 0x7fffffff, 0x7f, 0x4) [ 991.672365][T29900] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 991.691342][T29900] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 991.762652][T29900] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:47 executing program 4: prctl$PR_SET_DUMPABLE(0x4, 0x1) socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) socket$inet(0xa, 0x801, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x80, 0x6, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000000)={0x0, 0x4}) r1 = gettid() readahead(0xffffffffffffffff, 0x5, 0xf732) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/psched\x00') ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000200)) unshare(0x68020600) 06:10:47 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:47 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x7f, 0x4) 06:10:47 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x0, 0x0, @loopback}, 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) fadvise64(r0, 0x0, 0x89c9, 0x4) 06:10:47 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 992.073683][T30020] IPVS: ftp: loaded support on port[0] = 21 06:10:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:48 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x7f, 0x4) 06:10:48 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:48 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) [ 992.447502][T30067] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:10:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) [ 992.515721][T30067] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 992.534667][T30067] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:48 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8698071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x9, 0x6, 0x201}, 0x14}}, 0x0) 06:10:48 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x7f, 0x4) 06:10:48 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:48 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:48 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 06:10:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:48 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x7fffffff, 0x7f, 0x4) 06:10:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) [ 993.186757][T30176] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:10:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) [ 993.335056][T30176] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:10:49 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x7fffffff, 0x7f, 0x4) 06:10:49 executing program 4: perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de154bd8b44717e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200036158}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) dup(r0) flistxattr(r0, &(0x7f0000000080)=""/42, 0x2a) keyctl$link(0x8, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) 06:10:49 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 993.445691][T30176] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:49 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:49 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 06:10:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:49 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:49 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x7fffffff, 0x7f, 0x4) 06:10:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:49 executing program 4: r0 = mq_open(&(0x7f0000000000)='Pem1\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000080)=""/169, 0xa9, 0x0, &(0x7f0000000180)) 06:10:49 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) [ 994.022830][T30414] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 994.054620][T30414] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 994.091151][T30414] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:49 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) 06:10:49 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x7f, 0x4) 06:10:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:49 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:49 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:50 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:50 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x7f, 0x4) 06:10:50 executing program 5: r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:50 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) r3 = dup2(r1, r0) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 06:10:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000180)) r2 = getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x40000}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0x1, &(0x7f0000000100)="d2d4e94a2ae5f8d298e42cb6528e287f33001d9c2446db6d2699e5d1d1", &(0x7f0000000300)=""/4096, 0x4}, 0x20) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0xb4cb88652fa0bab, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x107480, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) close(0xffffffffffffffff) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200004) sendfile(0xffffffffffffffff, r6, 0x0, 0x80001d00c0d0) 06:10:50 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 994.627867][T30449] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 994.688571][T30449] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:10:50 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x7f, 0x4) 06:10:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:50 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) r3 = dup2(r1, r0) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 06:10:50 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 994.738041][ T731] tipc: TX() has been purged, node left! [ 994.757701][T30449] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 994.928072][ T731] tipc: TX() has been purged, node left! 06:10:50 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:50 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x0, 0x4) 06:10:50 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) r3 = dup2(r1, r0) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) [ 995.068193][ T731] tipc: TX() has been purged, node left! 06:10:50 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000100)={0x6, 'veth1_to_bond\x00', {0x101}}) r4 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) [ 995.185695][T30585] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:10:50 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 995.230834][T30585] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 995.268118][ T731] tipc: TX() has been purged, node left! 06:10:51 executing program 1: memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 06:10:51 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x0, 0x4) [ 995.324777][T30585] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) [ 995.428794][ T731] tipc: TX() has been purged, node left! 06:10:51 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:51 executing program 1: memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) [ 995.588074][ T731] tipc: TX() has been purged, node left! 06:10:51 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x0, 0x4) 06:10:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003280)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100766574680000c6bfeb21e2e24ee4a8716ee40000"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="44000000100081050000000000507291450938a8", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000b0001006970766c616e00000c000200060001000200000008000500", @ANYRES32=r3, @ANYBLOB="a07ed2028a19a14142e238e66f662038c75c315234a0c73fb0ef16072d42e50e36ca3edc8bf57d4fcf96590292f3d3233cabbae5830b1b337b39fcc990ddebb0e0477ddba97b7ceb33ace6cae9c30f84426b25f8adf33cbce84ad225b9d88e4751cdb5750da26de7c693b4c6518ab1271b37"], 0x44}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) 06:10:51 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 995.833105][T30738] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 06:10:51 executing program 1: memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 06:10:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:51 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x7f, 0x0) [ 995.928238][T30735] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 996.100192][T30735] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:10:51 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) socket$key(0xf, 0x3, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:51 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 06:10:51 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x4610, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() prctl$PR_GET_TID_ADDRESS(0x28, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup3(r2, r3, 0x0) dup2(r1, r4) [ 996.201507][T30735] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:52 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x7f, 0x0) 06:10:52 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:52 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) fadvise64(r0, 0x7fffffff, 0x7f, 0x0) 06:10:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:52 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) [ 996.648887][T30877] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 996.658883][T30877] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 996.679926][T30877] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:10:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:52 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000000c0)={0xfff, 0x0, 0x10000, 0x80, 0x13, "7c89f47989e29ce5874ba8e97b0478ed4b8fc6"}) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x801}, 0x808d5) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa678f559ffeb405a9f0100000000000"], 0x11) r4 = signalfd(r0, &(0x7f0000000000)={[0x8]}, 0x8) fallocate(r4, 0x3, 0x800013, 0x8020003) lseek(r3, 0x0, 0x3) 06:10:52 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r1 = gettid() ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:52 executing program 4: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x808d5) lseek(r0, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa6776559ffeb4"], 0x8) fallocate(r0, 0x3, 0x800013, 0x8020003) 06:10:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:52 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000000c0)={0xfff, 0x0, 0x10000, 0x80, 0x13, "7c89f47989e29ce5874ba8e97b0478ed4b8fc6"}) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x801}, 0x808d5) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa678f559ffeb405a9f0100000000000"], 0x11) r4 = signalfd(r0, &(0x7f0000000000)={[0x8]}, 0x8) fallocate(r4, 0x3, 0x800013, 0x8020003) lseek(r3, 0x0, 0x3) 06:10:52 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) [ 997.226404][T31013] EXT4-fs (loop3): bad geometry: block count 1080 exceeds size of device (1 blocks) 06:10:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:53 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r1 = gettid() ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:53 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000000c0)={0xfff, 0x0, 0x10000, 0x80, 0x13, "7c89f47989e29ce5874ba8e97b0478ed4b8fc6"}) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x801}, 0x808d5) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa678f559ffeb405a9f0100000000000"], 0x11) r4 = signalfd(r0, &(0x7f0000000000)={[0x8]}, 0x8) fallocate(r4, 0x3, 0x800013, 0x8020003) lseek(r3, 0x0, 0x3) 06:10:53 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:53 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 06:10:53 executing program 2: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140), 0xc, 0x0}, 0x80) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x801}, 0x808d5) lseek(r1, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa6776559ffeb405a9f0100000000000"], 0x11) fallocate(r1, 0x3, 0x800013, 0x8020003) lseek(r1, 0x0, 0x3) 06:10:53 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r1 = gettid() ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:53 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000000c0)={0xfff, 0x0, 0x10000, 0x80, 0x13, "7c89f47989e29ce5874ba8e97b0478ed4b8fc6"}) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x801}, 0x808d5) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa678f559ffeb405a9f0100000000000"], 0x11) r4 = signalfd(r0, &(0x7f0000000000)={[0x8]}, 0x8) fallocate(r4, 0x3, 0x800013, 0x8020003) lseek(r3, 0x0, 0x3) [ 997.958663][T31145] EXT4-fs (loop3): bad geometry: block count 1080 exceeds size of device (1 blocks) 06:10:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:53 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 06:10:53 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:53 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:53 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000000c0)={0xfff, 0x0, 0x10000, 0x80, 0x13, "7c89f47989e29ce5874ba8e97b0478ed4b8fc6"}) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x801}, 0x808d5) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa678f559ffeb405a9f0100000000000"], 0x11) r4 = signalfd(r0, &(0x7f0000000000)={[0x8]}, 0x8) fallocate(r4, 0x3, 0x800013, 0x8020003) lseek(r3, 0x0, 0x3) 06:10:54 executing program 2: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140), 0xc, 0x0}, 0x80) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x801}, 0x808d5) lseek(r1, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa6776559ffeb405a9f0100000000000"], 0x11) fallocate(r1, 0x3, 0x800013, 0x8020003) lseek(r1, 0x0, 0x3) 06:10:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:54 executing program 4: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140), 0xc, 0x0}, 0x80) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x801}, 0x808d5) lseek(r1, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa6776559ffeb405a9f0100000000000"], 0x11) fallocate(r1, 0x3, 0x800013, 0x8020003) lseek(r1, 0x0, 0x3) 06:10:54 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 06:10:54 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) [ 998.684928][T31189] EXT4-fs (loop3): bad geometry: block count 1080 exceeds size of device (1 blocks) 06:10:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r2, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:54 executing program 3: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000000a000000000000000091cc8c610000ffffff7f00000000000a0000000000100000000000000000000000ffffac141400000200000000000003"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:10:54 executing program 4: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140), 0xc, 0x0}, 0x80) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x801}, 0x808d5) lseek(r1, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa6776559ffeb405a9f0100000000000"], 0x11) fallocate(r1, 0x3, 0x800013, 0x8020003) lseek(r1, 0x0, 0x3) 06:10:54 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) 06:10:54 executing program 2: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140), 0xc, 0x0}, 0x80) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x801}, 0x808d5) lseek(r1, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa6776559ffeb405a9f0100000000000"], 0x11) fallocate(r1, 0x3, 0x800013, 0x8020003) lseek(r1, 0x0, 0x3) 06:10:54 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:54 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x6, 'gretap0\x00', {0x105}}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) [ 999.274847][T31212] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:10:55 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) 06:10:55 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) fchdir(r0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@dev, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{&(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc850}, {&(0x7f0000000440)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)="d97e3bf9088cf6c25691ca5bad74a83fb9a5625ec8c6b4b0b05382c7466da8d383f6230ae11bb1783916a9bb3ec4ccdd98972002206640a2675ff075992aeceb3448294843336e8544f5a9e542053dedfa7d908dec876807e02eda792eda7352eae553f49fd94156877ef6025349a8c3581e639aa6dee3b02af68f36f8da1f361e757e2446a8ed6bbc9c6a2181908f443f4b31fc78042432563c400ef076287240103f1b8f4449f72fcc74ff3f528c54a0dc32972af0d56fe121b99395b3d3", 0xbf}, {&(0x7f0000000700)="85080385d3c25bed6d89a3279690215109303b17154c71bf5aed2b32f0cb2ef08624621f621455035da0f44b9261011f0e9e597f086a9ddebd99fbf1e67f0a9da4f121faf10de64cd670783776c8cda5b6cac2843237e32a4a66f1ad5d1c7d17d8733df26c494ed2179935a4877595a35e15c6f4422a33d433c3c5ab342a4eb6df91021cd8fddce0d657cde640b4ec9c0a43ccc63b6bf77be1af7a6c05406ad8f8704ee7e137335c500162aeb2aacb46b6b390bc560a39ba4aa00f6161515f5668ab7cea5033ee6dfa1c5bf31e3dc0", 0xcf}], 0x4, 0x0, 0x0, 0x8090}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e80)="5408e48b9e31acd273145c5f0fac7f555ffba9927f3b2e15e0be0ddde358671f2d5aee047b68a1e58a196b868af8dfd1103adae4765ec206c96dafcddb55042548bc9b0fd25aa41eb86104de4bd165c4ab78f1049343dd471a589f9ef65bd1", 0x5f}, {&(0x7f0000002f00)="174f62a9406dacc60ddd22d3af37324ea1", 0x11}, {&(0x7f0000002f40)="68f4884a11", 0x5}, {&(0x7f0000002f80)="88bfdb342633f890d69b21c19ce3eb92c076a5da48fc7051baef8678f05a878136c59e120d04a285298db931388737535958445d62dbc3f609bc5beff33eda155b2554a49b26763c504756cb8cd3e3337dc1470e7999c4010d6e27684df99e7a2a3559da0e346966d6ece59a1a43c811a89d016ba4af7d899f3dde24c6ca22e07078542dcd2426bedc848584c51b9051a1367c48853fa81c049f4137c69ac3998eda87f84b096f89ec85c3610b74992693059241107e0de3889a083f050a", 0xbe}], 0x4, &(0x7f0000003080)}], 0x3, 0x40000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xea) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="230000002d0007031dfffd946fa2830020200ae800000000a61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) [ 999.343564][T31212] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 999.422845][T31212] EXT4-fs error (device loop3): ext4_fill_super:4488: inode #2: comm syz-executor.3: iget: root inode unallocated 06:10:55 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00050200000000000000000a000000", @ANYRES32=r1, @ANYBLOB="00000a0014000100000000000001"], 0x30}}, 0x0) [ 999.510394][T31212] EXT4-fs (loop3): get root inode failed [ 999.516343][T31212] EXT4-fs (loop3): mount failed 06:10:55 executing program 4: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140), 0xc, 0x0}, 0x80) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x801}, 0x808d5) lseek(r1, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="b1fa6776559ffeb405a9f0100000000000"], 0x11) fallocate(r1, 0x3, 0x800013, 0x8020003) lseek(r1, 0x0, 0x3) [ 999.556770][T31235] ================================================================== [ 999.564926][T31235] BUG: KCSAN: data-race in queue_access_lock / snd_seq_check_queue [ 999.572815][T31235] [ 999.575157][T31235] read to 0xffff88804d6a1964 of 1 bytes by interrupt on cpu 0: [ 999.582731][T31235] snd_seq_check_queue+0x59/0x200 [ 999.587884][T31235] snd_seq_timer_interrupt+0x243/0x280 [ 999.593449][T31235] snd_timer_process_callbacks+0x1e4/0x220 [ 999.599272][T31235] snd_timer_interrupt+0x483/0x930 [ 999.604401][T31235] snd_hrtimer_callback+0x18f/0x260 [ 999.609615][T31235] __hrtimer_run_queues+0x274/0x5f0 [ 999.614823][T31235] hrtimer_interrupt+0x22a/0x480 [ 999.619852][T31235] smp_apic_timer_interrupt+0xdc/0x280 [ 999.625323][T31235] apic_timer_interrupt+0xf/0x20 [ 999.630276][T31235] write_comp_data+0x1e/0x70 [ 999.634879][T31235] free_pages_and_swap_cache+0x69/0x2a0 [ 999.640432][T31235] tlb_flush_mmu+0x72/0x3b0 [ 999.644944][T31235] unmap_page_range+0x15e6/0x1940 [ 999.650050][T31235] unmap_single_vma+0x144/0x200 [ 999.654905][T31235] unmap_vmas+0xda/0x1a0 [ 999.659136][T31235] exit_mmap+0x13e/0x300 [ 999.663373][T31235] mmput+0xea/0x280 [ 999.667171][T31235] do_exit+0x4ac/0x18c0 [ 999.671316][T31235] do_group_exit+0xb4/0x1c0 [ 999.675806][T31235] get_signal+0x2a2/0x1320 [ 999.680212][T31235] do_signal+0x2f/0x6c0 [ 999.684358][T31235] exit_to_usermode_loop+0x250/0x2c0 [ 999.689753][T31235] do_syscall_64+0x384/0x3a0 [ 999.694481][T31235] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 999.700393][T31235] [ 999.702735][T31235] write to 0xffff88804d6a1964 of 1 bytes by task 31235 on cpu 1: [ 999.710459][T31235] queue_access_lock+0x89/0xc0 [ 999.715228][T31235] snd_seq_control_queue+0x77/0x350 [ 999.720421][T31235] event_input_timer+0x2f/0x50 [ 999.725190][T31235] snd_seq_deliver_single_event.constprop.0+0x3e8/0x4d0 [ 999.732114][T31235] snd_seq_deliver_event+0x2e9/0x4c0 [ 999.737388][T31235] snd_seq_dispatch_event+0xa1/0x340 [ 999.742673][T31235] snd_seq_check_queue+0xeb/0x200 [ 999.747735][T31235] snd_seq_enqueue_event+0x163/0x2b0 [ 999.753014][T31235] snd_seq_client_enqueue_event.constprop.0+0x187/0x2a0 [ 999.759947][T31235] snd_seq_write+0x23f/0x4d0 [ 999.764530][T31235] __vfs_write+0x67/0xc0 [ 999.768770][T31235] vfs_write+0x18a/0x390 [ 999.773128][T31235] ksys_write+0x17b/0x1b0 [ 999.777449][T31235] __x64_sys_write+0x4c/0x60 [ 999.782029][T31235] do_syscall_64+0xcc/0x3a0 [ 999.786525][T31235] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 999.792397][T31235] [ 999.794717][T31235] Reported by Kernel Concurrency Sanitizer on: [ 999.800858][T31235] CPU: 1 PID: 31235 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 999.809510][T31235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.819620][T31235] ================================================================== [ 999.827719][T31235] Kernel panic - not syncing: panic_on_warn set ... [ 999.834300][T31235] CPU: 1 PID: 31235 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 999.843002][T31235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.853044][T31235] Call Trace: [ 999.856397][T31235] dump_stack+0x11d/0x181 [ 999.860729][T31235] panic+0x210/0x640 [ 999.864631][T31235] ? vprintk_func+0x8d/0x140 [ 999.869259][T31235] kcsan_report.cold+0xc/0xd [ 999.873886][T31235] kcsan_setup_watchpoint+0x3fe/0x460 [ 999.879297][T31235] __tsan_unaligned_write1+0xc3/0x100 [ 999.884665][T31235] queue_access_lock+0x89/0xc0 [ 999.889460][T31235] snd_seq_control_queue+0x77/0x350 [ 999.894649][T31235] ? preempt_count_add+0x6f/0xb0 [ 999.899588][T31235] event_input_timer+0x2f/0x50 [ 999.904355][T31235] snd_seq_deliver_single_event.constprop.0+0x3e8/0x4d0 [ 999.911291][T31235] ? snd_seq_timer_open.cold+0x30/0x30 [ 999.916742][T31235] ? __schedule+0x30e/0x690 [ 999.921242][T31235] snd_seq_deliver_event+0x2e9/0x4c0 [ 999.926531][T31235] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 999.932386][T31235] ? preempt_count_add+0x6f/0xb0 [ 999.937340][T31235] ? snd_seq_client_use_ptr+0x93/0x2f0 [ 999.942797][T31235] snd_seq_dispatch_event+0xa1/0x340 [ 999.948078][T31235] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 999.953870][T31235] ? snd_seq_prioq_cell_out+0x163/0x210 [ 999.959414][T31235] snd_seq_check_queue+0xeb/0x200 [ 999.964450][T31235] snd_seq_enqueue_event+0x163/0x2b0 [ 999.969748][T31235] snd_seq_client_enqueue_event.constprop.0+0x187/0x2a0 [ 999.976969][T31235] snd_seq_write+0x23f/0x4d0 [ 999.981589][T31235] __vfs_write+0x67/0xc0 [ 999.985849][T31235] ? snd_seq_kernel_client_enqueue+0x160/0x160 [ 999.991998][T31235] vfs_write+0x18a/0x390 [ 999.996250][T31235] ksys_write+0x17b/0x1b0 [ 1000.000581][T31235] __x64_sys_write+0x4c/0x60 [ 1000.005161][T31235] do_syscall_64+0xcc/0x3a0 [ 1000.009685][T31235] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1000.015574][T31235] RIP: 0033:0x45b399 [ 1000.019461][T31235] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1000.039050][T31235] RSP: 002b:00007f7013080c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1000.047448][T31235] RAX: ffffffffffffffda RBX: 00007f70130816d4 RCX: 000000000045b399 [ 1000.055414][T31235] RDX: 000000000000fcc8 RSI: 0000000020000000 RDI: 0000000000000003 [ 1000.063408][T31235] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1000.071513][T31235] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1000.079472][T31235] R13: 0000000000000cce R14: 00000000004cdb15 R15: 000000000075bf2c [ 1000.088788][T31235] Kernel Offset: disabled [ 1000.093116][T31235] Rebooting in 86400 seconds..