[ 57.025717] audit: type=1800 audit(1541006440.058:27): pid=6090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 59.034762] kauditd_printk_skb: 1 callbacks suppressed [ 59.034799] audit: type=1800 audit(1541006442.088:29): pid=6090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 59.060207] audit: type=1800 audit(1541006442.088:30): pid=6090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.35' (ECDSA) to the list of known hosts. 2018/10/31 17:20:54 fuzzer started 2018/10/31 17:20:59 dialing manager at 10.128.0.26:37347 2018/10/31 17:21:00 syscalls: 1 2018/10/31 17:21:00 code coverage: enabled 2018/10/31 17:21:00 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/31 17:21:00 setuid sandbox: enabled 2018/10/31 17:21:00 namespace sandbox: enabled 2018/10/31 17:21:00 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/31 17:21:00 fault injection: enabled 2018/10/31 17:21:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/31 17:21:00 net packed injection: enabled 2018/10/31 17:21:00 net device setup: enabled 17:23:41 executing program 0: syzkaller login: [ 239.532616] IPVS: ftp: loaded support on port[0] = 21 [ 241.848462] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.855163] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.863971] device bridge_slave_0 entered promiscuous mode [ 242.004039] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.010556] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.019479] device bridge_slave_1 entered promiscuous mode [ 242.157305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 242.296147] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 242.717452] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 242.857644] bond0: Enslaving bond_slave_1 as an active interface with an up link 17:23:46 executing program 1: [ 243.675331] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 243.683717] team0: Port device team_slave_0 added [ 243.883460] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.891495] team0: Port device team_slave_1 added [ 244.068214] IPVS: ftp: loaded support on port[0] = 21 [ 244.188759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.407325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 244.414543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 244.423578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.740218] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 244.748038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.757541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.958603] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 244.966800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.976174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.251904] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.258413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.265714] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.272259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.281178] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 247.692348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.756123] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.762764] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.771283] device bridge_slave_0 entered promiscuous mode [ 248.017776] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.025066] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.033709] device bridge_slave_1 entered promiscuous mode [ 248.253452] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 248.469422] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 249.149337] bond0: Enslaving bond_slave_0 as an active interface with an up link 17:23:52 executing program 2: [ 249.424985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.717181] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 249.726501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.048828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 250.056105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.479321] IPVS: ftp: loaded support on port[0] = 21 [ 250.920735] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 250.929095] team0: Port device team_slave_0 added [ 251.214079] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 251.222344] team0: Port device team_slave_1 added [ 251.527625] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 251.534924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.544251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.826227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 251.833551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.842525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.086869] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.095067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.104326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.298594] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 252.306622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.315946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.057222] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.064129] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.072658] device bridge_slave_0 entered promiscuous mode [ 255.369000] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.375684] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.384419] device bridge_slave_1 entered promiscuous mode [ 255.628906] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.635557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.642825] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.649316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.658528] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.724135] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 255.942232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.053393] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 256.832324] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 257.129922] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 257.448192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 257.455533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 257.696418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 257.704313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 257.754300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.416570] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 258.424795] team0: Port device team_slave_0 added [ 258.605321] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 258.613554] team0: Port device team_slave_1 added 17:24:01 executing program 3: [ 258.900876] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.915269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 258.923460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 258.932372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.210912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 259.218515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.227407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.604010] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 259.611705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.621253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.948405] IPVS: ftp: loaded support on port[0] = 21 [ 259.983724] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 259.991443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.000780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.151247] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 260.158029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.166077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.410943] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.818942] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.825681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.832999] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.839527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.848574] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 263.855436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.018543] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.026871] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.035746] device bridge_slave_0 entered promiscuous mode [ 266.450835] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.457510] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.466349] device bridge_slave_1 entered promiscuous mode [ 266.807706] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 267.127702] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 268.144946] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 268.484851] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 268.882710] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 268.890432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.235949] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 269.243257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.443129] 8021q: adding VLAN 0 to HW filter on device bond0 17:24:12 executing program 0: 17:24:13 executing program 0: 17:24:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x820000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4002, 0x102) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000440)) ioctl$KDGETLED(r2, 0x4b31, &(0x7f00000000c0)) getsockopt$inet_mreq(r2, 0x0, 0x27, &(0x7f0000000280)={@rand_addr, @multicast1}, &(0x7f0000000340)=0x8) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000300)=""/50, &(0x7f0000000240)=0x32) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4040}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="880000982a3d40895a72bc00", @ANYRES16=r3, @ANYBLOB="080029bd7000fedbdf250500000008000100000000000c00080007000000000000000c00070008000100", @ANYRES32=r2, @ANYBLOB="0c00080020000000000000000c00070008000100", @ANYRES32=r2, @ANYBLOB="0c00080001000080000000000c00050008000000000000000c0003003c0e0000000000000c000300dd060000000000000c0008000100000000000000"], 0x88}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000024000), 0xc, &(0x7f0000023ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000005000000000000090000000000000000"], 0x14}}, 0x0) dup2(r1, r0) [ 270.419107] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 270.427835] team0: Port device team_slave_0 added 17:24:13 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x7, 0x9}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000440)="0f00d2b8010000000f01c1882a67260f35b9800000c00f3235008000000f300f57a72c6900000f20d835080000000f22d8b9950900000f32b9e80800000f32b904090000b800700000ba000000000f30", 0x50}], 0x1, 0x0, &(0x7f0000000280), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x12, 0x0, 0x1}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:13 executing program 4: set_mempolicy(0xc003, &(0x7f0000000000)=0xfffffffffffffffb, 0xfff) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) fcntl$setflags(r0, 0x2, 0x1) r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x2, 0x40) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000080)={0x0, 0xd2, 0x3}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x408001, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x100000001}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={r3, 0x200, 0x6, 0x1, 0x8e52, 0x2}, 0x14) signalfd(r1, &(0x7f00000001c0)={0x5}, 0x8) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000200)={0xa, @sdr={0x71436772, 0x1}}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f0000000340)={0x0, 0x80000, r4}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000380)={r5}) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, &(0x7f00000003c0)=0x5, 0x7, 0x7) mq_timedreceive(r2, &(0x7f0000000400)=""/4096, 0x1000, 0x1, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000001400)=0x0) ptrace$getsig(0x4202, r6, 0x1, &(0x7f0000001440)) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f0000001480)) write$binfmt_misc(r2, &(0x7f00000014c0)={'syz0', "2c355279ae23b84e5412c9ec62db42d6be6e5089b423b84056fe8fac7d447e5be962ed536c2002812865cb93ea039c8739e22e515175075d24c21fd05c8b3e67e9f5c39f68156905309bdfa3acb66d1eca90a3896be4ae0e5318df7942a3026d38213afb7366388289552365a304038fb93c5ccc4a1a487f675f80459ea2e0524e1e1edf5f2b9b5483f6d684085a1ea42bd4800d1f5c015fd33ab269c1d031de89e45ba4c8409ffedd8e13d6c416dec4e15739bf89efdb517b8c35182f906f0f0f245c0a5a1cfb1c2a"}, 0xcd) sendto$inet6(r0, &(0x7f00000015c0)="ce742ee66637ce24b4c1941f989520aab745a235c1a92a6f", 0x18, 0x800, &(0x7f0000001600)={0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x12}, 0x66e}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000001640)=@hopopts={0x6, 0x2, [], [@hao={0xc9, 0x10, @local}, @generic={0x80000000}]}, 0x20) exit_group(0x400) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000001680)={0x5, 0x2, 0x3dcfa179, 0x14b, 0x5}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000016c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001880)={r2, &(0x7f0000001700)="d8a5624a1b0d4fdb7aa1bb541605b200b984bb72e10d582d062ed8838a641c331f2e7023c0a24dba3aa12e42b44d12990746e3b719ced6fe3fc9d80d3e52728f452ac5f48f5e39c181f06e11190c978e6ed9234629488d05bca4924af443003d3885c76d4d706bc9461d61bdf3a9d66adc2b34a757a8d524868bd71fbb9e3b94fdb9d0b0e266ce70972fca8a405e3418093b62116dcf100a3a52ff17dbae4bd068fe1bbc9bc81e3e6b9107fd95f3bf7c63e98a5d6803c34f7d10834272b1f1a78fb28021f5277ab4f990d0a87acfaf32bdf5d5716da20b58008e", &(0x7f0000001800)=""/104}, 0x18) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/ppp\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000001900)={0x1f, 0x10001, 0x8203, 0x2, 0x5, 0xae68, 0x96cb, 0xff00000000000000, r3}, 0x20) write$uinput_user_dev(r4, &(0x7f0000001940)={'syz0\x00', {0x1, 0x2, 0x3ff, 0x8b1e}, 0x17, [0x101, 0x2, 0x6, 0x0, 0x1f, 0x6, 0x7, 0x6, 0x7, 0x1, 0xfffffffffffffff7, 0x5, 0x9, 0x7, 0x1000, 0x4, 0x8, 0x946, 0x81, 0xfd, 0x7, 0x5, 0x6, 0x0, 0x1f, 0xfffffffffffffff8, 0x1, 0x1, 0x944, 0x9, 0x2, 0x20, 0xfffffffffffffffa, 0x0, 0x4, 0x2, 0xe378, 0x3f, 0x2, 0x80, 0x5b7, 0x8, 0x9ba, 0x10000, 0x4, 0x1, 0xa47, 0x2000000000000000, 0x4, 0xffffffffffffc4ad, 0x7, 0x8, 0x4, 0x7fffffff, 0x10000, 0x4, 0x6, 0x8000, 0xfffffffffffffff9, 0x6, 0x5, 0x3, 0x9dff, 0x3], [0x5, 0x3, 0x401, 0x8, 0x2, 0x0, 0x7fffffff, 0x2a, 0x7, 0xffffffff, 0x401, 0x0, 0x9, 0x7, 0x4f2, 0x100000000, 0x5, 0x8, 0x5, 0x2, 0x100, 0x5, 0x7ff, 0x0, 0x1, 0x1, 0x58, 0x7, 0xec53, 0x5, 0x6, 0x3f, 0x9, 0x7fffffff, 0x3, 0x8, 0x2, 0x9, 0x7, 0x1, 0x1, 0xb24, 0x9, 0x0, 0x6, 0x3, 0x7, 0xff, 0xffffffff, 0x3ff, 0x4, 0x7, 0x720, 0x100, 0x9, 0xfffffffffffff000, 0x1, 0x2, 0x3, 0xffffffffffff0000, 0x4, 0x9, 0x100000000], [0x80000000, 0x5, 0x100000001, 0x36b, 0x2, 0x80, 0x6, 0x2, 0x9, 0x7, 0x4, 0x8, 0x1137, 0x7, 0x3, 0x4, 0x9, 0x4, 0x9, 0x400, 0x97, 0x6, 0x1, 0x1f, 0x1, 0x0, 0x4, 0xffff, 0x4, 0x9, 0x1, 0x1000, 0x8001, 0x0, 0xf65, 0x7, 0x3, 0x8, 0x8, 0x9, 0x4, 0x2, 0x2, 0x7, 0x3, 0x7f, 0x1, 0xff, 0x100, 0x200, 0xffffffffffff0169, 0xd7653ff, 0x4f9, 0x1f, 0x0, 0xfffffffffffffff7, 0xff, 0x80000000, 0x2, 0xb7dd, 0x1, 0x3f, 0x400, 0x822], [0x81, 0x1, 0x6, 0x6, 0x88, 0x1, 0x70e549c5, 0x8, 0x4, 0x8001, 0x0, 0x3ff, 0x8, 0x1000, 0x9, 0x8, 0x95c, 0x98, 0x419, 0x10001, 0x0, 0x5, 0x8, 0x9d5, 0x2, 0x80, 0x3, 0x2, 0x1, 0x10001, 0x8, 0xe1, 0x9, 0x3, 0x100, 0x0, 0x1000, 0x8, 0x9, 0x5, 0x1, 0x10000, 0x1, 0x10000, 0x124c, 0x1f, 0xc0, 0x9, 0x40, 0x1000, 0x9, 0x9, 0x0, 0x2, 0x10000, 0x24b8, 0x1, 0x9, 0x9, 0x7, 0x3ff, 0x400, 0x2, 0x2]}, 0x45c) sendto$inet(r7, &(0x7f0000001dc0)="f48fda0dc0ee73c2f2afce8c0433f47b9183fd5ddfa68391fa659e346465c4ec1c249f181d15f407e411186113647749e884030ea0b0ce5a362aae8fc11b7cc2e72dd57ea126862319088a24303182535269ce6a785243fb6b26e624bf45ced140ff12d0e60413149a42", 0x6a, 0x4004004, &(0x7f0000001e40)={0x2, 0x4e23, @loopback}, 0x10) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, &(0x7f0000001e80)={0x0, 0x1004, 0x5, 0xa40a, 0x4}) [ 270.931252] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 270.939551] team0: Port device team_slave_1 added [ 270.984697] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 271.024419] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 271.419300] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 271.426542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.435353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 17:24:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, &(0x7f0000000040), 0x100000000000020a) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x1, 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.posix_acl_default\x00', &(0x7f0000000040)='/dev/kvm\x00', 0x9, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x5}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xfdd9) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 271.904674] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 271.912002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.920719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.344016] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 272.351758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.361261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.498868] IPVS: ftp: loaded support on port[0] = 21 [ 272.528601] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 272.535278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 17:24:15 executing program 0: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000200)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x1200000000}, &(0x7f0000000280)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r1, 0xfffffffffffffffe, 0x30}, 0xc) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000001300)={0x16, 0x1000, &(0x7f0000000300)="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"}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000040)) socketpair(0x3, 0x5, 0xfffffffffffffff8, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1, 0x30}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000140)={r4, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0x3, 0x97b8, 0x71, 0x41}, 0x98) [ 272.543251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.861439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 272.869394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.878664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 17:24:16 executing program 0: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000200)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x1200000000}, &(0x7f0000000280)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r1, 0xfffffffffffffffe, 0x30}, 0xc) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000001300)={0x16, 0x1000, &(0x7f0000000300)="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"}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000040)) socketpair(0x3, 0x5, 0xfffffffffffffff8, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1, 0x30}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000140)={r4, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0x3, 0x97b8, 0x71, 0x41}, 0x98) 17:24:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)) [ 274.269416] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.397096] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.403667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.410721] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.417292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.425968] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 277.882374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.448701] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.455400] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.464240] device bridge_slave_0 entered promiscuous mode [ 278.774924] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.781393] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.790215] device bridge_slave_1 entered promiscuous mode [ 279.103396] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 279.349787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.424834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 280.423304] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 280.730299] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 280.743570] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 281.005888] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 281.013141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 281.336284] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 281.343699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 282.208315] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 282.214889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.223110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.386810] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 282.395219] team0: Port device team_slave_0 added [ 282.773414] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 282.781489] team0: Port device team_slave_1 added 17:24:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffeffffffff}, 0xa000003fe, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8), &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xffffffffffffff0a, 0xaaa8}) [ 283.063244] rpcbind: RPC call returned error 22 [ 283.086798] rpcbind: RPC call returned error 22 [ 283.224527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 283.231633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 283.240562] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 283.467611] 8021q: adding VLAN 0 to HW filter on device team0 [ 283.518841] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 283.526313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 283.535227] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 283.692250] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 283.699990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.709528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.954826] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 283.962726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.971711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.252142] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.258633] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.265862] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.272429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.280841] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 286.288049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 287.173760] not chained 20000 origins [ 287.177636] CPU: 1 PID: 7327 Comm: ip Not tainted 4.19.0+ #76 [ 287.183533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.192904] Call Trace: [ 287.195524] dump_stack+0x306/0x460 [ 287.199203] kmsan_internal_chain_origin+0x222/0x240 [ 287.204341] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 287.209742] ? __module_address+0x6a/0x600 [ 287.214025] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 287.219418] ? is_bpf_text_address+0x47e/0x4b0 [ 287.224037] ? INIT_INT+0xc/0x30 [ 287.227434] ? __kernel_text_address+0x250/0x350 [ 287.232240] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 287.237715] ? __save_stack_trace+0x9ec/0xc60 [ 287.242241] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 287.247657] __msan_chain_origin+0x75/0xd0 [ 287.251926] save_stack_trace+0xd3/0xe0 [ 287.255937] kmsan_internal_chain_origin+0x136/0x240 [ 287.261080] ? kmsan_internal_chain_origin+0x136/0x240 [ 287.266848] ? kmsan_memcpy_origins+0x13d/0x1b0 [ 287.271537] ? __msan_memcpy+0x6f/0x80 [ 287.275447] ? nla_put+0x20a/0x2d0 [ 287.279025] ? tun_fill_info+0x7b7/0xaf0 [ 287.283113] ? rtnl_fill_ifinfo+0x555b/0x6c90 [ 287.287631] ? rtnl_dump_ifinfo+0xc04/0x19b0 [ 287.292065] ? netlink_dump+0x958/0x1730 [ 287.296146] ? netlink_recvmsg+0xf1a/0x1930 [ 287.300502] ? sock_recvmsg+0x1d6/0x230 [ 287.304514] ? ___sys_recvmsg+0x459/0xae0 [ 287.308687] ? __se_sys_recvmsg+0x2fc/0x450 [ 287.313035] ? __x64_sys_recvmsg+0x4a/0x70 [ 287.317296] ? do_syscall_64+0xbe/0x100 [ 287.321300] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 287.326718] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 287.332109] ? find_next_bit+0x25b/0x2a0 [ 287.336195] ? vmalloc_to_page+0x57d/0x6b0 [ 287.340473] ? kmsan_set_origin+0x83/0x130 [ 287.344725] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 287.350094] kmsan_memcpy_origins+0x13d/0x1b0 [ 287.354596] __msan_memcpy+0x6f/0x80 [ 287.358309] nla_put+0x20a/0x2d0 [ 287.361680] tun_fill_info+0x88a/0xaf0 [ 287.365572] ? tun_get_size+0x30/0x30 [ 287.369377] rtnl_fill_ifinfo+0x555b/0x6c90 [ 287.373733] rtnl_dump_ifinfo+0xc04/0x19b0 [ 287.378036] ? kmsan_set_origin+0x83/0x130 [ 287.382278] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 287.387648] ? rtnl_getlink+0xe50/0xe50 [ 287.391617] netlink_dump+0x958/0x1730 [ 287.395525] netlink_recvmsg+0xf1a/0x1930 [ 287.399697] sock_recvmsg+0x1d6/0x230 [ 287.403502] ? netlink_sendmsg+0x1420/0x1420 [ 287.407911] ___sys_recvmsg+0x459/0xae0 [ 287.411927] ? __msan_poison_alloca+0x1f0/0x2c0 [ 287.416611] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 287.421992] ? __fdget+0x22b/0x430 [ 287.425570] __se_sys_recvmsg+0x2fc/0x450 [ 287.429734] __x64_sys_recvmsg+0x4a/0x70 [ 287.433791] do_syscall_64+0xbe/0x100 [ 287.437590] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 287.442773] RIP: 0033:0x7f0facc08210 [ 287.446487] Code: 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 90 83 3d e5 d3 2a 00 00 75 10 b8 2f 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e bb 00 00 48 89 04 24 [ 287.465381] RSP: 002b:00007ffe349dba38 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 287.473088] RAX: ffffffffffffffda RBX: 00000000006395c0 RCX: 00007f0facc08210 [ 287.480349] RDX: 0000000000000000 RSI: 00007ffe349dba80 RDI: 0000000000000003 [ 287.487614] RBP: 00007ffe349dff20 R08: 0000000000000000 R09: 0000000000000000 [ 287.494897] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006395c0 [ 287.502163] R13: 00007ffe349dfbe8 R14: 0000000000000000 R15: 0000000000000000 [ 287.509438] Uninit was stored to memory at: [ 287.513786] kmsan_internal_chain_origin+0x136/0x240 [ 287.518880] __msan_chain_origin+0x75/0xd0 [ 287.523109] save_stack_trace+0xd3/0xe0 [ 287.527077] kmsan_internal_chain_origin+0x136/0x240 [ 287.532176] kmsan_memcpy_origins+0x13d/0x1b0 [ 287.536662] __msan_memcpy+0x6f/0x80 [ 287.540375] nla_put+0x20a/0x2d0 [ 287.543738] tun_fill_info+0x7b7/0xaf0 [ 287.547618] rtnl_fill_ifinfo+0x555b/0x6c90 [ 287.551942] rtnl_dump_ifinfo+0xc04/0x19b0 [ 287.556175] netlink_dump+0x958/0x1730 [ 287.560053] netlink_recvmsg+0xf1a/0x1930 [ 287.564194] sock_recvmsg+0x1d6/0x230 [ 287.567992] ___sys_recvmsg+0x459/0xae0 [ 287.571960] __se_sys_recvmsg+0x2fc/0x450 [ 287.576190] __x64_sys_recvmsg+0x4a/0x70 [ 287.580247] do_syscall_64+0xbe/0x100 [ 287.584045] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 287.589217] [ 287.590832] Uninit was stored to memory at: [ 287.595154] kmsan_internal_chain_origin+0x136/0x240 [ 287.600253] __msan_chain_origin+0x75/0xd0 [ 287.604492] __save_stack_trace+0x82d/0xc60 [ 287.608945] save_stack_trace+0xa2/0xe0 [ 287.612918] kmsan_internal_chain_origin+0x136/0x240 [ 287.618015] kmsan_memcpy_origins+0x13d/0x1b0 [ 287.622507] __msan_memcpy+0x6f/0x80 [ 287.626213] nla_put+0x20a/0x2d0 [ 287.629577] tun_fill_info+0x6df/0xaf0 [ 287.633460] rtnl_fill_ifinfo+0x555b/0x6c90 [ 287.637893] rtnl_dump_ifinfo+0xc04/0x19b0 [ 287.642121] netlink_dump+0x958/0x1730 [ 287.646024] netlink_recvmsg+0xf1a/0x1930 [ 287.650165] sock_recvmsg+0x1d6/0x230 [ 287.653960] ___sys_recvmsg+0x459/0xae0 [ 287.657930] __se_sys_recvmsg+0x2fc/0x450 [ 287.662074] __x64_sys_recvmsg+0x4a/0x70 [ 287.666130] do_syscall_64+0xbe/0x100 [ 287.669923] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 287.675095] [ 287.676709] Uninit was stored to memory at: [ 287.681022] kmsan_internal_chain_origin+0x136/0x240 [ 287.686122] __msan_chain_origin+0x75/0xd0 [ 287.690347] save_stack_trace+0xd3/0xe0 [ 287.694313] kmsan_internal_chain_origin+0x136/0x240 [ 287.699406] kmsan_memcpy_origins+0x13d/0x1b0 [ 287.703893] __msan_memcpy+0x6f/0x80 [ 287.707601] nla_put+0x20a/0x2d0 [ 287.710961] tun_fill_info+0x6df/0xaf0 [ 287.714849] rtnl_fill_ifinfo+0x555b/0x6c90 [ 287.719162] rtnl_dump_ifinfo+0xc04/0x19b0 [ 287.723394] netlink_dump+0x958/0x1730 [ 287.727272] netlink_recvmsg+0xf1a/0x1930 [ 287.731432] sock_recvmsg+0x1d6/0x230 [ 287.735234] ___sys_recvmsg+0x459/0xae0 [ 287.739201] __se_sys_recvmsg+0x2fc/0x450 [ 287.743344] __x64_sys_recvmsg+0x4a/0x70 [ 287.747409] do_syscall_64+0xbe/0x100 [ 287.751219] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 287.756391] [ 287.758007] Uninit was stored to memory at: [ 287.762323] kmsan_internal_chain_origin+0x136/0x240 [ 287.767418] __msan_chain_origin+0x75/0xd0 [ 287.771648] __save_stack_trace+0x82d/0xc60 [ 287.775991] save_stack_trace+0xa2/0xe0 [ 287.779960] kmsan_internal_chain_origin+0x136/0x240 [ 287.785061] kmsan_memcpy_origins+0x13d/0x1b0 [ 287.789552] __msan_memcpy+0x6f/0x80 [ 287.793264] nla_put+0x20a/0x2d0 [ 287.796626] tun_fill_info+0x603/0xaf0 [ 287.800512] rtnl_fill_ifinfo+0x555b/0x6c90 [ 287.804829] rtnl_dump_ifinfo+0xc04/0x19b0 [ 287.809060] netlink_dump+0x958/0x1730 [ 287.812939] netlink_recvmsg+0xf1a/0x1930 [ 287.817079] sock_recvmsg+0x1d6/0x230 [ 287.820874] ___sys_recvmsg+0x459/0xae0 [ 287.824842] __se_sys_recvmsg+0x2fc/0x450 [ 287.828995] __x64_sys_recvmsg+0x4a/0x70 [ 287.833054] do_syscall_64+0xbe/0x100 [ 287.836852] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 287.842031] [ 287.843653] Uninit was stored to memory at: [ 287.847968] kmsan_internal_chain_origin+0x136/0x240 [ 287.853112] __msan_chain_origin+0x75/0xd0 [ 287.857340] save_stack_trace+0xd3/0xe0 [ 287.861306] kmsan_internal_chain_origin+0x136/0x240 [ 287.866444] kmsan_memcpy_origins+0x13d/0x1b0 [ 287.870947] __msan_memcpy+0x6f/0x80 [ 287.874659] nla_put+0x20a/0x2d0 [ 287.878022] tun_fill_info+0x603/0xaf0 [ 287.881919] rtnl_fill_ifinfo+0x555b/0x6c90 [ 287.886251] rtnl_dump_ifinfo+0xc04/0x19b0 [ 287.890486] netlink_dump+0x958/0x1730 [ 287.894367] netlink_recvmsg+0xf1a/0x1930 [ 287.898509] sock_recvmsg+0x1d6/0x230 [ 287.902305] ___sys_recvmsg+0x459/0xae0 [ 287.906269] __se_sys_recvmsg+0x2fc/0x450 [ 287.910426] __x64_sys_recvmsg+0x4a/0x70 [ 287.914486] do_syscall_64+0xbe/0x100 [ 287.918284] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 287.923479] [ 287.925094] Uninit was stored to memory at: [ 287.929405] kmsan_internal_chain_origin+0x136/0x240 [ 287.934504] __msan_chain_origin+0x75/0xd0 [ 287.938734] __save_stack_trace+0x82d/0xc60 [ 287.943052] save_stack_trace+0xa2/0xe0 [ 287.947019] kmsan_internal_chain_origin+0x136/0x240 [ 287.952120] kmsan_memcpy_origins+0x13d/0x1b0 [ 287.956609] __msan_memcpy+0x6f/0x80 [ 287.960316] nla_put+0x20a/0x2d0 [ 287.963680] tun_fill_info+0x1a2/0xaf0 [ 287.967563] rtnl_fill_ifinfo+0x555b/0x6c90 [ 287.971890] rtnl_dump_ifinfo+0xc04/0x19b0 [ 287.976133] netlink_dump+0x958/0x1730 [ 287.980013] netlink_recvmsg+0xf1a/0x1930 [ 287.984158] sock_recvmsg+0x1d6/0x230 [ 287.988105] ___sys_recvmsg+0x459/0xae0 [ 287.992111] __se_sys_recvmsg+0x2fc/0x450 [ 287.996252] __x64_sys_recvmsg+0x4a/0x70 [ 288.000304] do_syscall_64+0xbe/0x100 [ 288.004102] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 288.009275] [ 288.010888] Uninit was stored to memory at: [ 288.015203] kmsan_internal_chain_origin+0x136/0x240 [ 288.020299] __msan_chain_origin+0x75/0xd0 [ 288.024535] save_stack_trace+0xd3/0xe0 [ 288.028505] kmsan_internal_chain_origin+0x136/0x240 [ 288.033602] kmsan_memcpy_origins+0x13d/0x1b0 [ 288.038088] __msan_memcpy+0x6f/0x80 [ 288.041810] nla_put+0x20a/0x2d0 [ 288.045191] tun_fill_info+0x1a2/0xaf0 [ 288.049075] rtnl_fill_ifinfo+0x555b/0x6c90 [ 288.053402] rtnl_dump_ifinfo+0xc04/0x19b0 [ 288.057628] netlink_dump+0x958/0x1730 [ 288.061507] netlink_recvmsg+0xf1a/0x1930 [ 288.065650] sock_recvmsg+0x1d6/0x230 [ 288.069444] ___sys_recvmsg+0x459/0xae0 [ 288.073419] __se_sys_recvmsg+0x2fc/0x450 [ 288.077561] __x64_sys_recvmsg+0x4a/0x70 [ 288.081615] do_syscall_64+0xbe/0x100 [ 288.085414] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 288.090595] [ 288.092212] Local variable description: ----v.addr.i.i.i@__inc_numa_state [ 288.099124] Variable was created at: [ 288.102851] __inc_numa_state+0x98/0x480 [ 288.106910] rmqueue_pcplist+0x58c6/0x5ae0 [ 289.299108] 8021q: adding VLAN 0 to HW filter on device bond0 17:24:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000001c0), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001800210a00cb0000000000000a0000160104810000000000140005000000000020b5ec7a4602888e3095a38f"], 0x1}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 290.118186] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 290.639061] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 290.645659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.653957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.179211] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.765012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.337427] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 17:24:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffeffffffff}, 0xa000003fe, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8), &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xffffffffffffff0a, 0xaaa8}) 17:24:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x6fa, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000640), 0x49) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r0, &(0x7f00000007c0)="f8f81963c343395d68a85a3b7fff77c4792c53dee9eab7441ca4f317c3ad294fd4301b7db2fd96ddb305ab725d0df475d79ba481fb90e9a5cf70188ad7af78e057f3dc4338bfae22eeb2058a836c8d9cfddc9be356976b5cf3b52da30dfe2d8e1b7492deef0f44c8f080bbf745f11fee55a6a73f9304473b74573b91e9f3f62a004b1537c47cc3f47a6f1bb0dc69117628e0b409926cf37b8a295a2e8f176e50805d3c1efc6de02cdc576734155a12136033a17e062600caa14c3c64b19e029e94419949f5d36c13", 0xc8, 0x40000, &(0x7f0000000440)={0x2, 0x4e24, @multicast1}, 0x10) setsockopt$inet_int(r1, 0x0, 0xa, &(0x7f0000000500)=0x1, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffff9c, 0x10, &(0x7f0000000180)={&(0x7f0000000340)=""/95, 0xffffffffffffff6d, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r2, 0x10, &(0x7f00000003c0)={&(0x7f0000000280)=""/151, 0x97, r3}}, 0x10) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0a5c3d023c126285718070") r5 = socket$inet(0x2, 0x3, 0x2000000087) sendto$inet(r5, &(0x7f0000000180), 0x0, 0x8004, &(0x7f0000000240), 0x10) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x3, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e24, @dev}, {0x2, 0x4e21, @broadcast}, 0xcf, 0x100000001, 0x4, 0x9, 0x10000, 0x0, 0x4}) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) getsockname$inet(r2, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000540)=0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000040)=""/20, 0x14}, 0x100) shutdown(r0, 0x1) 17:24:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x109000, 0x12) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000080)=0x8, 0x4) getsockopt$inet_buf(r0, 0x0, 0x400000000000487, &(0x7f0000dcffe8)=""/24, &(0x7f0000000000)=0xfe5f) 17:24:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) connect(r0, &(0x7f00000012c0)=@nl=@unspec, 0x80) 17:24:37 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[{0x8, 0xff}, {0xb, 0xffffffff00000000}, {0xa, 0x1}], 0x3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000080)={{0x7, @name="57814437dc5c93b3d04b34f9b51802db20a3ac4b76067f98967de40a42f570f6"}, 0x8, 0x8001, 0x4}) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000000c0)={0x0, 0xc2e6, 0x4}) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000100)={0x9}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="424f1fea53df3f1fd306b20a1a9e5ebc", 0x10) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) vmsplice(r2, &(0x7f0000001440)=[{&(0x7f0000000200)="52fadadd410f80143917be387fdcbd52e6a2970ed3435d0ad6d3867bfc8ebdb73205d6a50c4c5a1b4deccc300b99e069fcbe57d6f52544e0facfe4ee870f5666042ecb565ad58e135c0a34686c", 0x4d}, {&(0x7f0000000280)="0351033689d7661738121ca6576be0fc359cf658f63e8465da6bf3e2bfdca97db408d206bcf9952ffeb2effc5e222e04cc85eee6dba4a87b2370190d1880a1cb9d2b8118", 0x44}, {&(0x7f0000000300)="4ddf27f8e2b358da7da60d73ac3c50b3a45bf0388e2b69d3e6d5acb91a812b5dd87aab6b2d58aaf94bb9d4b3f866f3ac3dc20afd9e55dfa6897f5ca47583a60bc6c444578fe6879ef902e9ebf9183ed4021764e5ba9e258fe808736268f86c6d7e5cd7fc6373e29ebd81ef983ec02883411cd3930fd6c70574c6f8c84a899f1d7c063dba530d75d8125f5174b83f37fa2a03f9f5af0f026c6acf06e94838a2777306e7517c61887dade829ec67b9dd56743dd944c293ebbb520a3cd17114a8be5d60f7c10613fd21dd69e5ba9abb93486d346f2b675330a587e001c5ee356aa000da2dd60b722a5b0b549918dbab8857", 0xf0}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="1873517e8ae0b18ea9bcc617bf089ec1e60291bfed483b", 0x17}], 0x5, 0x6) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000014c0)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x100, 0xe0, 0x3, 0x1, 0x25}, &(0x7f0000001580)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000015c0)={r3, 0x6}, &(0x7f0000001600)=0x8) tee(r2, r2, 0x81, 0x2) sendmsg$inet_sctp(r1, &(0x7f0000002c80)={&(0x7f0000001640)=@in6={0xa, 0x4e22, 0x2, @local, 0x8}, 0x1c, &(0x7f0000002b40)=[{&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000002680)="3d1a202fffe16b31c27c64394e87ca63d00845a3a0b57b009e897c107f5fdf061265ba8ed68cba2582bc068d71750d2a40188fb9e56a89cfa8383a4f2fe1e7a08607030e995e88d8690fcad7835021295fa27ee8f1814b9695fc69bbbf063eda1c843d0c3b5c05b5890b1e528d546ff4ea56b5acd7e8308bd4d957c7e7075e7d2e20ed", 0x83}, {&(0x7f0000002740)="926c0be0b12e92b3604db56cafd613d07b4854dcc768ac9b6afd04ae01ad781a61a4f4430ad2e481c236937cd7d16e43f1c1216dbc16cc1c44105c4fb18618c339501825bd8aac92746f6346315b0a78b10848bb66ba51d9", 0x58}, {&(0x7f00000027c0)="31d553997020363dfba0ed3d81c83e77e7ee6c350b1bf24353d2608cdfab1e84812d08a1ca1ae5e0c4eb1138e817a08e8d6326379f02522a08c732ed", 0x3c}, {&(0x7f0000002800)="de02eb782cb21355c35d01923a4b1fa06f83e5d81f60d4649a71b7c358a0495d9110b4ed48cd924c5d1fc7a531789b25b32c69b90f9c476977250505be2a634e0461df6612b33bb10e092718af339ed6662fa8de725adda3c3182b0f570959a808c3af639c89d7578224a3f7d1f46300ab361b585614d2a3ed2105c4eaaaadea4040529a3b2478251bd4942e89280cecfe838dadb4bb4813bdf4a04399623186938b99c21fc188", 0xa7}, {&(0x7f00000028c0)="3d16c1058c019d99190d6f9bd5b9f3e01cf54788714bdbe1303d9c71f4d08895aec6d5dbb77288c9547e1d501f130b5561b16c7219b042967fd5aba5fa4e073f3341009942448b393fec0b8250d60f92ebe9778bb7be5074d370a47e33af7599428c6c182179a35570120662bfa8ad2779558b7777ba0cc05fad0190600265d4e470abeb8eff966fe65cd5c32c26000eb579d260fcd83fd35c689b7ace09e6db5e538c888d345649047f1b8eb4da3b8b1aa6788f3ab13c21", 0xb8}, {&(0x7f0000002980)="2d805f5fcaa59c84643399c1987d94cd25597f8fbd73d2d8b994e908af44b4b7dfec3cb3b8f889150bd30c8cbf28441b86ba0e21848f5334c70228703b8fc80aba71d21edb472d9808561bdd493770ab504d5d7fee7f251e2082ba218b5162660107e09aa50eafa8a8d626", 0x6b}, {&(0x7f0000002a00)="430e18b949ad50fe5b613fd8bb208a76cc997ff41356152845322fa9ad2c1967ed189d671cbcc455ff5d44aa9e933dbf57b045d269fccc1c977cecfb1b0581d0dee956877c6adb53936576715eab79a80a822798fda34d14b7d654b6efa1fb2c94b91c83a4553735704f570a1281c4788827f0a90cebeb1fee62e9008b66a2fa93089dcdf812ad0e4ccbba306b3642c230322ee377383c1e54f19830aa3421f9dde03f911bd1178efd3dcec2c5aa7685c5626072b69f5762", 0xb8}, {&(0x7f0000002ac0)="de471572695451fe486461b9bdb6b3785ad86e6c253af85638c817499d3f87d29e6958191a0223e75d34ea4aea9e37f1b15ede8cacd4f982a8d08122e5511981212ef13de3a87738a4f5019f69f959559317660b25f367873dd41d417e87836d2cd73fad382b88e192b208f659c1a863b63d38c5", 0x74}], 0x9, &(0x7f0000002c00)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x1e}}, @sndrcv={0x30, 0x84, 0x1, {0x2, 0x962, 0x8, 0x80, 0x4, 0x0, 0x6, 0x8000, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x13}}], 0x60, 0x200000c1}, 0x800) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000002cc0)={'icmp6\x00'}, &(0x7f0000002d00)=0x1e) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000002d40)={r4, 0x7}, 0x8) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000002d80), &(0x7f0000002dc0)=0x4) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000002e00)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000002e40), &(0x7f0000002e80)=0x8) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000002ec0)={'team0\x00', 0x4}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000002f00)=""/144, &(0x7f0000002fc0)=0x90) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000003000)="474d1e1b72db04cf1f082f40c00c4a3e", 0x10) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000003040)) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000003080)={0x8, 0x5, 0x8, 0x7, 0x19, 0xcd}) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f00000030c0)="87637558adfa287e052d621fd68e5040", 0x10) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000003100)={0x31, 0x4, 0x0, {0x4, 0xfffffffffffffff8, 0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x31) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000003140)) r6 = syz_genetlink_get_family_id$team(&(0x7f00000031c0)='team\x00') getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000003200)={0x0, @multicast1, @broadcast}, &(0x7f0000003240)=0xc) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000003340)={@empty, @multicast2, 0x0}, &(0x7f0000003380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000033c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f00000034c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003500)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000003600)=0xe8) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000003880)={&(0x7f0000003180), 0xc, &(0x7f0000003840)={&(0x7f0000003640)={0x1e0, r6, 0x400, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r7}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r8}, {0x178, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x15fa, 0x2, 0x20, 0xd24}, {0x800, 0x1, 0x90e, 0x1}, {0x2000, 0x4, 0x10001, 0x3}, {0x101, 0x8001, 0x1, 0x9}, {0x4, 0x100, 0x6, 0x80}, {0x14, 0xb41, 0x2, 0x8}, {0x8, 0x6e9, 0xdebf054, 0x6d24}, {0x8, 0x0, 0x6}]}}}]}}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) [ 294.652319] rpcbind: RPC call returned error 22 [ 295.356714] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 295.363180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.370992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.468058] IPVS: ftp: loaded support on port[0] = 21 [ 295.945606] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.727084] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.733660] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.742363] device bridge_slave_0 entered promiscuous mode [ 297.880576] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.887103] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.895312] device bridge_slave_1 entered promiscuous mode [ 298.034049] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 298.162355] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 298.590322] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 298.731056] bond0: Enslaving bond_slave_1 as an active interface with an up link 17:24:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={&(0x7f0000000040)={0x10, 0x3f00000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000018000101000000000000000002000a00000000010000000008000b00ac14140008000400e0000001"], 0x1}}, 0x0) 17:24:42 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x307, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={"000000000000000000e9dc00", 0x200082}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)) socketpair(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') 17:24:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x6fa, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000640), 0x49) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r0, &(0x7f00000007c0)="f8f81963c343395d68a85a3b7fff77c4792c53dee9eab7441ca4f317c3ad294fd4301b7db2fd96ddb305ab725d0df475d79ba481fb90e9a5cf70188ad7af78e057f3dc4338bfae22eeb2058a836c8d9cfddc9be356976b5cf3b52da30dfe2d8e1b7492deef0f44c8f080bbf745f11fee55a6a73f9304473b74573b91e9f3f62a004b1537c47cc3f47a6f1bb0dc69117628e0b409926cf37b8a295a2e8f176e50805d3c1efc6de02cdc576734155a12136033a17e062600caa14c3c64b19e029e94419949f5d36c13", 0xc8, 0x40000, &(0x7f0000000440)={0x2, 0x4e24, @multicast1}, 0x10) setsockopt$inet_int(r1, 0x0, 0xa, &(0x7f0000000500)=0x1, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffff9c, 0x10, &(0x7f0000000180)={&(0x7f0000000340)=""/95, 0xffffffffffffff6d, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r2, 0x10, &(0x7f00000003c0)={&(0x7f0000000280)=""/151, 0x97, r3}}, 0x10) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0a5c3d023c126285718070") r5 = socket$inet(0x2, 0x3, 0x2000000087) sendto$inet(r5, &(0x7f0000000180), 0x0, 0x8004, &(0x7f0000000240), 0x10) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x3, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e24, @dev}, {0x2, 0x4e21, @broadcast}, 0xcf, 0x100000001, 0x4, 0x9, 0x10000, 0x0, 0x4}) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) getsockname$inet(r2, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000540)=0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000040)=""/20, 0x14}, 0x100) shutdown(r0, 0x1) 17:24:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0xff) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/126, 0x7e, 0x2140, &(0x7f0000000380)={0x2, 0x4e20}, 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x1f5, 0x20007ffc) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0xba, 0x10, 0x0, 0x20af, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x6, 0x83a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf220, 0x0, 0x0, 0x0, 0x3cf0, 0x0, 0x8, 0x0, 0x80, 0x0, 0x7f, 0x100000001, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x10, 0x0, 0x6, 0x3, 0x7, 0x4}, 0x0, 0x10, r0, 0xb) 17:24:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 17:24:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="636c6561725f7265667300b04978e60c4ba32fd7b949714bcbe80c57af59747c61a316192863f51994df164ba4b9aecbafea034f5b6bb15332860b9f14c654d101bf2f389e498d517e07202484f5c9d8edcad2f073e0ca50780265d38d1e297b9d66a71452b92cae675696215008f21e87e2cd4da0d1b5f3b4d6f8caf34a15ed2b2c98fcbf5812") r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') sendfile(r0, r1, &(0x7f0000000080)=0x1000, 0x5) 17:24:42 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18}, 0x7) ioprio_set$pid(0x2, 0x0, 0x6eeb) write$P9_RREADLINK(r0, &(0x7f0000000080)={0xfff1, 0x17, 0x0, {0x5, './bus'}}, 0xe) [ 299.598022] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 299.606209] team0: Port device team_slave_0 added 17:24:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 17:24:42 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x0, 0xfffffffffffffffd, 0x0, 0x0, "e5bd9285cf1bf3bd9a84a937dc44d70984b1486f27f7e021000000002051501e"}) 17:24:43 executing program 2: sched_setattr(0x0, &(0x7f0000000080), 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000003c0)=@random={'btrfs.', 'group_id'}, &(0x7f0000000400)='filter\x00', 0x7, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) [ 300.138172] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 300.146369] team0: Port device team_slave_1 added [ 300.530184] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 300.537424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 300.546402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.648925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 300.656078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 300.665016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.740057] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 300.747534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.756836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.829039] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 300.836450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.845693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 301.665611] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.672083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.678875] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.685431] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.693159] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 302.202589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.737898] 8021q: adding VLAN 0 to HW filter on device bond0 [ 305.016777] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 305.303459] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 305.309757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.318210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.598592] 8021q: adding VLAN 0 to HW filter on device team0 17:24:50 executing program 0: socketpair$unix(0x1, 0x10000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/169, 0xa9) 17:24:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000100)=""/105, 0x69}], 0x1, 0x0) 17:24:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f0000000240)=@getsadinfo={0x14, 0x23, 0x901}, 0x14}}, 0x0) 17:24:50 executing program 3: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000080)="1f0000000104ffffed3b54c007110000f30501000b00020000c8ac9f5fa560", 0x1f) 17:24:50 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2203}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x8923, &(0x7f0000000700)={'eql\x00', @ifru_flags}) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./control\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) 17:24:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0xff) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/126, 0x7e, 0x2140, &(0x7f0000000380)={0x2, 0x4e20}, 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x1f5, 0x20007ffc) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0xba, 0x10, 0x0, 0x20af, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x6, 0x83a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf220, 0x0, 0x0, 0x0, 0x3cf0, 0x0, 0x8, 0x0, 0x80, 0x0, 0x7f, 0x100000001, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x10, 0x0, 0x6, 0x3, 0x7, 0x4}, 0x0, 0x10, r0, 0xb) [ 307.656880] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 307.729096] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 17:24:50 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:24:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) linkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x226003459bc7d056) 17:24:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x33) 17:24:51 executing program 5: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r1, &(0x7f0000000100), 0x2007ff) 17:24:51 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) r2 = request_key(&(0x7f0000000680)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x2}, &(0x7f0000000700)='\\ppp0&&\x00', 0xfffffffffffffffe) request_key(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)='-\x00', r2) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_persistent(0x16, 0x0, r3) getgroups(0x7, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x34, r5, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x9e}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x11}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x4000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x48200, 0x0) stat(&(0x7f0000003580)='./file0\x00', &(0x7f00000035c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000003640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000036c0), &(0x7f0000003700)=0xc) 17:24:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r1, &(0x7f0000000240)=""/4096, 0x1000) 17:24:51 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x2, 0x0, 0x0) 17:24:51 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f0000000040)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000740)=ANY=[]}}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) r2 = dup(r0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 17:24:51 executing program 5: 17:24:51 executing program 3: 17:24:51 executing program 0: 17:24:51 executing program 1: 17:24:52 executing program 5: 17:24:52 executing program 2: 17:24:52 executing program 4: 17:24:52 executing program 3: 17:24:52 executing program 0: 17:24:52 executing program 2: 17:24:52 executing program 5: 17:24:52 executing program 1: 17:24:52 executing program 4: 17:24:52 executing program 3: 17:24:52 executing program 0: 17:24:52 executing program 1: 17:24:52 executing program 2: 17:24:53 executing program 5: 17:24:53 executing program 4: 17:24:53 executing program 3: 17:24:53 executing program 0: 17:24:53 executing program 2: 17:24:53 executing program 1: 17:24:53 executing program 5: 17:24:53 executing program 4: r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0xc08c5336, &(0x7f0000000280)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}) 17:24:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1, 0x0) write(r0, &(0x7f00000001c0)="4f7ad0c9edb302486f1748144523c0c253773e00d49ba39063e2432e8de58f5930fd07000000dcf50bbc54b70c0ea17b4728dde5f9eedfc811ff1f75642558334444c9fe3d13", 0x46) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)) 17:24:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendto(r1, &(0x7f0000000a80)="96602e63cc1c2bdfe7745452d7098141a0", 0x11, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000013f80)=[{{&(0x7f000000df00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f000000f200)=[{&(0x7f000000df80)=""/53, 0x35}], 0x1, &(0x7f000000f280)=""/167, 0xa7}}], 0x1, 0x0, &(0x7f0000014200)) 17:24:53 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc02c5341, &(0x7f0000000280)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}) 17:24:53 executing program 1: 17:24:53 executing program 5: 17:24:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1, &(0x7f0000000a00)=""/181, 0xb5}}], 0x1, 0x0, &(0x7f0000000040)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f0000000280), 0x0) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:24:54 executing program 1: prctl$intptr(0x26, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) 17:24:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1, 0x0) write(r0, &(0x7f00000001c0)="4f7ad0c9edb302486f1748144523c0c253773e00d49ba39063e2432e8de58f5930fd07000000dcf50bbc54b70c0ea17b4728dde5f9eedfc811ff1f75642558334444c9fe3d13", 0x46) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)) 17:24:54 executing program 5: syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000280)={0x0, 0x0, {0xffffffffffffffff}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}) 17:24:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0xcb, &(0x7f0000000200)={@link_local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv6={0x86dd, {0x0, 0x6, "d147dd", 0x95, 0x0, 0x0, @remote, @empty, {[@hopopts={0x0, 0x1, [], [@ra={0x5, 0x2, 0x8}, @jumbo]}], @tcp={{0x4e24, 0x4e20, 0x41424344, 0x41424344, 0xb336, 0x0, 0x9, 0x40, 0x400, 0x0, 0x9, {[@exp_smc={0xfe, 0x6}, @sack_perm={0x4, 0x2}, @sack_perm={0x4, 0x2}, @mss={0x2, 0x4, 0x1f}, @nop]}}, {"7755eba4da7dd59b69eebfd8b54531b244909158657b0f40a7f279698010543552f3ff8c9065d956fb275622062cf9cdf1a1909e39068e9f6de42eb94c90eb33002bba5cce84c739485aef14ae165735ad1ab742dff1c01831"}}}}}}}, &(0x7f00000000c0)={0x0, 0x0, [0xffffffffffffffff]}) 17:24:54 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc08c5334, &(0x7f0000000280)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}) 17:24:54 executing program 2: ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000280)={0x0, 0x0, {0xffffffff00000002}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}) 17:24:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0xaaaaaaaaaaaab7d, 0x0, &(0x7f0000000080), 0x111) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:54 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000080)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 17:24:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="2c000000190001f550000000000000001d01000018000400643fb7296438700ab20000000000000000000000"], 0x1}}, 0x0) 17:24:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0xfffffffc}) 17:24:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, &(0x7f0000000040), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1000000000010004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000024000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000100)="c7442400c4000000c744240246220000ff1c240f20c035080000000f22c048b80e000000000000000f23c80f21f835040080000f23f8440f210266ba4000ec66b820010f00d88fc900906db9f2400f09f3440f168f0c000000440f01f6", 0x5d}], 0x1, 0x0, &(0x7f0000000180)=[@efer={0x2, 0x400}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:24:55 executing program 1: unshare(0x20020000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000e00)=ANY=[], &(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='sysfs\x00', 0x0, &(0x7f0000001700)='system.posix_acl_default\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') accept4(0xffffffffffffffff, &(0x7f0000000840)=@nfc, &(0x7f00000008c0)=0x80, 0x0) poll(&(0x7f00000003c0), 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') 17:24:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) setpriority(0x0, 0x0, 0x0) 17:24:55 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) membarrier(0x0, 0x0) [ 312.642618] audit: type=1326 audit(1541006695.688:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8088 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:24:55 executing program 5: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f00000002c0)={0x8}, 0x0) 17:24:55 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000200)=""/226, 0xe2}], 0x1, 0x4) 17:24:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0xaaaaaaaaaaaab7d, 0x0, &(0x7f0000000080), 0x111) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, &(0x7f0000000180), 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000080)="68bd0000d7ebd3") times(&(0x7f00000000c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:24:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0xaaaaaaaaaaaab7d, 0x0, &(0x7f0000000080), 0x111) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:24:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f00000005c0)) 17:24:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) setregid(0x0, 0x0) [ 313.371314] audit: type=1326 audit(1541006696.418:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8088 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 313.478513] audit: type=1326 audit(1541006696.528:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8120 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:24:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) nanosleep(&(0x7f00000000c0), &(0x7f0000000280)) 17:24:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b3fdc)) write(r0, &(0x7f00000001c0)="4f7ad0c9edb302486f1748144523c0c253773e00d49ba39063e2432e8de58f5930fd07000000dcf50bbc54b70c0ea17b4728dde5f9eedfc811ff1f75642558334444c9fe3d13", 0x46) r1 = syz_open_pts(r0, 0x1) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000180)="10", 0x1}], 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)) 17:24:56 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) fchmod(r0, 0x0) 17:24:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x1f) [ 313.712075] audit: type=1326 audit(1541006696.758:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8124 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:24:56 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) [ 313.870897] audit: type=1326 audit(1541006696.918:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8131 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:24:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x17}) 17:24:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) tgkill(0x0, 0x0, 0x0) 17:24:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) waitid(0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)) [ 314.253539] audit: type=1326 audit(1541006697.308:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8120 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 314.394936] audit: type=1326 audit(1541006697.448:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8151 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 314.477144] audit: type=1326 audit(1541006697.498:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8153 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:24:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x0) setxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) 17:24:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) flock(r0, 0x8) [ 314.520891] audit: type=1326 audit(1541006697.558:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8124 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 314.634006] audit: type=1326 audit(1541006697.678:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8131 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:24:57 executing program 3: io_setup(0xffff, &(0x7f0000000080)) 17:24:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0)={0x0, 0x1c9c380}) 17:24:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffdfffffffe}]}) setgroups(0x0, &(0x7f0000000240)) 17:24:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigpending(&(0x7f0000000040), 0x8) 17:24:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x8) 17:24:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000380)) 17:24:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffdfffffffe}]}) r0 = eventfd2(0x0, 0x0) fstatfs(r0, &(0x7f0000000180)=""/251) [ 315.622026] hrtimer: interrupt took 233483 ns 17:24:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) close(r1) 17:24:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = eventfd(0x9) readv(r0, &(0x7f0000000880), 0x0) 17:24:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000800)="0f0159000f09c462fd31921b000000c4e2e59902421c9d66baf80cb8d817b684ef66bafc0cb000ee66baa00066ed0fc76889650fc7a907000000f0418072e6d7", 0x40}], 0x1, 0x0, &(0x7f0000000840), 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:24:59 executing program 4: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendfile(r0, r1, &(0x7f0000000000), 0x7fffffff) 17:24:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffdfffffffe}]}) munlockall() 17:24:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), &(0x7f00000004c0)={&(0x7f0000000480), 0x8}) 17:24:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f00000001c0)=""/111) 17:24:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000800)="0f0159000f09c462fd31921b000000c4e2e59902421c9d66baf80cb8d817b684ef66bafc0cb000ee66baa00066ed0fc76889650fc7a907000000f0418072e6d7", 0x40}], 0x1, 0x0, &(0x7f0000000840), 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:24:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000800)="0f0159000f09c462fd31921b000000c4e2e59902421c9d66baf80cb8d817b684ef66bafc0cb000ee66baa00066ed0fc76889650fc7a907000000f0418072e6d7", 0x40}], 0x1, 0x0, &(0x7f0000000840), 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:24:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) rt_sigpending(&(0x7f0000000000), 0x8) 17:25:00 executing program 5: syz_open_procfs(0x0, &(0x7f0000000b00)='loginuid\x00') perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000800)="0f0159000f09c462fd31921b000000c4e2e59902421c9d66baf80cb8d817b684ef66bafc0cb000ee66baa00066ed0fc76889650fc7a907000000f0418072e6d7", 0x40}], 0x1, 0x0, &(0x7f0000000840), 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:00 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff7f006df55b0dfa938207d9fb3780", 0x18, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 17:25:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffdfffffffe}]}) semget$private(0x0, 0x4, 0x0) 17:25:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) sync() [ 317.604904] skbuff: bad partial csum: csum=65535/65535 headroom=128 headlen=14 17:25:00 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) membarrier(0x0, 0x0) 17:25:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 317.726111] kauditd_printk_skb: 24 callbacks suppressed [ 317.726149] audit: type=1326 audit(1541006700.778:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8272 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 317.841800] audit: type=1326 audit(1541006700.878:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8245 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000800)="0f0159000f09c462fd31921b000000c4e2e59902421c9d66baf80cb8d817b684ef66bafc0cb000ee66baa00066ed0fc76889650fc7a907000000f0418072e6d7", 0x40}], 0x1, 0x0, &(0x7f0000000840), 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:25:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt(r1, 0x0, 0xa, &(0x7f00000000c0)=""/148, &(0x7f0000000040)=0x2ae) 17:25:01 executing program 4: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x0) [ 318.332261] audit: type=1326 audit(1541006701.378:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8265 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 318.459051] audit: type=1326 audit(1541006701.508:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8272 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000800)="0f0159000f09c462fd31921b000000c4e2e59902421c9d66baf80cb8d817b684ef66bafc0cb000ee66baa00066ed0fc76889650fc7a907000000f0418072e6d7", 0x40}], 0x1, 0x0, &(0x7f0000000840), 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:25:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) uname(&(0x7f0000000100)=""/210) 17:25:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) [ 318.716571] audit: type=1326 audit(1541006701.768:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8308 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:01 executing program 0: msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xc4248780811af55a) 17:25:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) [ 318.937006] audit: type=1326 audit(1541006701.988:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8317 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:02 executing program 0: ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000280)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f00000003c0)) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f00000000c0)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000006a80)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x198) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040), 0x10) [ 319.115084] audit: type=1326 audit(1541006702.168:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8323 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:02 executing program 1: ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000040)={0x0, 0x6, 0x101}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x10, 0xffffffffffffffff, 0x0) io_setup(0xffff, &(0x7f0000000080)) 17:25:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 319.520449] audit: type=1326 audit(1541006702.568:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8308 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fdatasync(0xffffffffffffffff) [ 319.716773] audit: type=1326 audit(1541006702.768:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8317 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x13, &(0x7f0000000200), 0x8) [ 319.901618] audit: type=1326 audit(1541006702.948:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8323 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x1}], 0x20000000000000e4) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r1, 0x1104000000016) 17:25:03 executing program 3: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x2) fcntl$addseals(r0, 0x409, 0x9) write$P9_RSTATFS(r0, &(0x7f0000000700)={0x43}, 0x43) 17:25:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000180)={0x15, 0x7}) 17:25:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000000c0)) 17:25:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/98) 17:25:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)={0x0, 0x0, [0x0, 0x0, 0x67]}) 17:25:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x12, &(0x7f0000000200), 0x4) 17:25:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000200), 0x8) 17:25:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 17:25:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:10 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000006209000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e7c8730db04e17f80000000000000000005ad2884c15a4620ac172240a107d1730ed01542269ed35c3311aefe0030000002b0a43ae13d68b0663a4425d6a5360ea0a9c"], 0xaa) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB='4']) dup3(r1, r0, 0x0) 17:25:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 17:25:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:11 executing program 3: 17:25:11 executing program 0: 17:25:11 executing program 4: 17:25:11 executing program 5: 17:25:11 executing program 1: 17:25:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:11 executing program 1: 17:25:11 executing program 4: 17:25:11 executing program 0: 17:25:11 executing program 3: 17:25:12 executing program 5: 17:25:12 executing program 1: 17:25:12 executing program 0: 17:25:12 executing program 4: 17:25:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:12 executing program 3: 17:25:12 executing program 5: 17:25:12 executing program 1: 17:25:12 executing program 0: 17:25:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:12 executing program 4: 17:25:13 executing program 5: 17:25:13 executing program 3: 17:25:13 executing program 1: 17:25:13 executing program 0: 17:25:13 executing program 4: 17:25:13 executing program 5: 17:25:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:13 executing program 1: 17:25:13 executing program 5: 17:25:13 executing program 4: 17:25:13 executing program 0: 17:25:13 executing program 3: 17:25:14 executing program 5: 17:25:14 executing program 1: 17:25:14 executing program 0: 17:25:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:14 executing program 4: 17:25:14 executing program 3: 17:25:14 executing program 5: 17:25:14 executing program 0: 17:25:14 executing program 1: 17:25:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:14 executing program 0: 17:25:14 executing program 4: 17:25:14 executing program 5: 17:25:14 executing program 3: 17:25:15 executing program 1: 17:25:15 executing program 5: 17:25:15 executing program 4: 17:25:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:15 executing program 0: 17:25:15 executing program 5: 17:25:15 executing program 3: 17:25:15 executing program 1: 17:25:15 executing program 0: 17:25:15 executing program 4: 17:25:15 executing program 5: 17:25:15 executing program 3: 17:25:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:15 executing program 1: 17:25:16 executing program 0: 17:25:16 executing program 5: 17:25:16 executing program 1: 17:25:16 executing program 4: 17:25:16 executing program 3: 17:25:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:16 executing program 5: 17:25:16 executing program 0: 17:25:16 executing program 1: 17:25:16 executing program 4: 17:25:16 executing program 3: 17:25:16 executing program 5: 17:25:17 executing program 0: 17:25:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:17 executing program 1: 17:25:17 executing program 5: 17:25:17 executing program 3: 17:25:17 executing program 4: 17:25:17 executing program 1: 17:25:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:17 executing program 0: 17:25:17 executing program 5: 17:25:17 executing program 3: r0 = add_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='`', 0x1, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) 17:25:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@can, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000480)=""/40, 0x28}, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000340)}, 0x0) 17:25:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) 17:25:18 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x4}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 17:25:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = shmat(0x0, &(0x7f0000ffb000/0x3000)=nil, 0x4000) shmdt(r0) [ 335.169286] audit: type=1326 audit(1541006718.218:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8601 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:18 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syncfs(r0) [ 335.222478] audit: type=1326 audit(1541006718.258:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8597 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 335.244641] audit: type=1326 audit(1541006718.268:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8602 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:18 executing program 3: 17:25:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 335.855833] audit: type=1326 audit(1541006718.908:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8597 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:19 executing program 3: [ 335.934604] audit: type=1326 audit(1541006718.958:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8601 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:19 executing program 0: [ 336.087484] audit: type=1326 audit(1541006719.018:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8602 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:19 executing program 3: 17:25:19 executing program 5: 17:25:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) [ 336.690235] audit: type=1326 audit(1541006719.738:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8644 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 337.219027] syz-executor1 (8605) used greatest stack depth: 52592 bytes left 17:25:20 executing program 1: 17:25:20 executing program 0: 17:25:20 executing program 3: 17:25:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:20 executing program 5: 17:25:20 executing program 4: 17:25:20 executing program 5: 17:25:20 executing program 4: 17:25:21 executing program 0: futex(&(0x7f0000a52000), 0x4, 0x0, &(0x7f000000cff0)={0x0, 0x989680}, &(0x7f0000a52000), 0x0) 17:25:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 17:25:21 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = inotify_init() mknod(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x20000000) inotify_add_watch(r0, &(0x7f0000000140)='./file0/file0\x00', 0x400) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 17:25:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x10000000000018, &(0x7f0000534000), &(0x7f0000000040)=0x4) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 17:25:21 executing program 0: futex(&(0x7f0000a52000), 0x4, 0x0, &(0x7f000000cff0)={0x0, 0x989680}, &(0x7f0000a52000), 0x0) 17:25:21 executing program 4: futex(&(0x7f0000a52000), 0x5, 0x0, &(0x7f000000cff0)={0x0, 0x989680}, &(0x7f0000000000), 0xfffffffffffffffe) 17:25:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r1, r1, &(0x7f0000000000)=0x20000, 0x800000080000002) 17:25:21 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x400}) [ 338.691965] futex_wake_op: syz-executor4 tries to shift op by -1; fix this program 17:25:21 executing program 0: [ 338.794121] futex_wake_op: syz-executor4 tries to shift op by -1; fix this program 17:25:21 executing program 5: 17:25:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:22 executing program 4: 17:25:22 executing program 3: 17:25:22 executing program 5: 17:25:22 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/146, 0x92) 17:25:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:22 executing program 5: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000000)=""/149) 17:25:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000180)) r3 = syz_open_pts(r0, 0x0) dup2(r2, r3) 17:25:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) socket(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) 17:25:22 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x1) 17:25:22 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) 17:25:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc08c5336, &(0x7f00000002c0)) 17:25:23 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x60000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) [ 340.179185] audit: type=1326 audit(1541006723.228:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8738 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:23 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000e00)=ANY=[], &(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='sysfs\x00', 0x0, &(0x7f0000001700)='system.posix_acl_default\x00') rmdir(&(0x7f0000000100)='./file0\x00') 17:25:23 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYBLOB="852a6273d4a400"], @ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, &(0x7f00000003c0)}) 17:25:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x14) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000040), &(0x7f0000000200)=""/209}, 0xc) [ 340.520078] binder: 8758:8760 unknown command 536871424 [ 340.526035] binder: 8758:8760 ioctl c0306201 20000440 returned -22 [ 340.571967] binder: 8758:8765 unknown command 536871424 [ 340.577550] binder: 8758:8765 ioctl c0306201 20000440 returned -22 [ 340.662761] not chained 30000 origins [ 340.666636] CPU: 0 PID: 8761 Comm: syz-executor2 Not tainted 4.19.0+ #76 [ 340.673495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.682866] Call Trace: [ 340.685462] [ 340.687654] dump_stack+0x306/0x460 [ 340.691328] kmsan_internal_chain_origin+0x222/0x240 [ 340.696458] ? gre_tap_xmit+0x4e6/0x910 [ 340.700476] ? arp_solicit+0xda9/0xec0 [ 340.704393] ? neigh_probe+0x1ea/0x360 [ 340.708303] ? neigh_timer_handler+0xae1/0x12a0 [ 340.712996] ? call_timer_fn+0x326/0x700 [ 340.717088] ? __run_timers+0xe75/0x12e0 [ 340.721178] ? run_timer_softirq+0x2e/0x50 [ 340.725443] ? __do_softirq+0x611/0xa84 [ 340.729453] ? irq_exit+0x250/0x290 [ 340.733109] ? exiting_irq+0xe/0x10 [ 340.736764] ? smp_apic_timer_interrupt+0x64/0x90 [ 340.741626] ? apic_timer_interrupt+0xf/0x20 [ 340.746059] ? kmsan_internal_check_memory+0xa4/0x460 [ 340.751270] ? kmsan_check_memory+0xb/0x10 [ 340.755534] ? release_pages+0x395/0x1790 17:25:23 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x1000000000020011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYBLOB="852a6273d4a4"], @ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, &(0x7f00000003c0)}) [ 340.759707] ? free_pages_and_swap_cache+0x55b/0x590 [ 340.764839] ? unmap_page_range+0x34a8/0x3db0 [ 340.769359] ? unmap_single_vma+0x445/0x5e0 [ 340.773711] ? unmap_vmas+0x251/0x380 [ 340.777543] ? exit_mmap+0x50e/0xa00 [ 340.781289] ? __mmput+0x16d/0x700 [ 340.784860] ? mmput+0x178/0x1f0 [ 340.788250] ? exit_mm+0xaf6/0xbd0 [ 340.791821] ? do_exit+0x101f/0x3f90 [ 340.795565] ? do_group_exit+0x1a0/0x350 [ 340.799658] ? get_signal+0x1693/0x2390 [ 340.803663] ? do_signal+0x1ed/0x2da0 [ 340.807500] ? prepare_exit_to_usermode+0x293/0x470 [ 340.812542] ? syscall_return_slowpath+0x112/0x880 [ 340.817505] ? do_syscall_64+0xe4/0x100 [ 340.821518] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 340.826925] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 340.832421] ? __module_address+0x6a/0x600 [ 340.836705] ? get_stack_info+0x8cd/0x9b0 [ 340.840907] __msan_chain_origin+0x75/0xd0 [ 340.845179] __save_stack_trace+0x8b8/0xc60 [ 340.849540] ? apic_timer_interrupt+0xf/0x20 [ 340.853997] ? apic_timer_interrupt+0xf/0x20 [ 340.858441] save_stack_trace+0xa2/0xe0 [ 340.862455] kmsan_internal_chain_origin+0x136/0x240 [ 340.867588] ? __do_softirq+0x611/0xa84 [ 340.871604] ? __mmput+0x16d/0x700 [ 340.875162] ? kmsan_internal_chain_origin+0x136/0x240 [ 340.880455] ? kmsan_memcpy_origins+0x13d/0x1b0 [ 340.885234] ? __msan_memcpy+0x6f/0x80 [ 340.889144] ? pskb_expand_head+0x441/0x1d00 [ 340.893570] ? gre_tap_xmit+0x4e6/0x910 [ 340.897560] ? dev_hard_start_xmit+0x6b8/0xdb0 [ 340.902161] ? sch_direct_xmit+0x58a/0x880 [ 340.906409] ? __qdisc_run+0x1724/0x3530 [ 340.910493] ? __dev_queue_xmit+0x1c30/0x3d90 [ 340.915003] ? dev_queue_xmit+0x4b/0x60 [ 340.918994] ? arp_send_dst+0xac8/0xbd0 [ 340.922987] ? arp_solicit+0xda9/0xec0 [ 340.926975] ? neigh_probe+0x1ea/0x360 [ 340.930874] ? neigh_timer_handler+0xae1/0x12a0 [ 340.935566] ? call_timer_fn+0x326/0x700 [ 340.939645] ? __run_timers+0xe75/0x12e0 [ 340.943721] ? run_timer_softirq+0x2e/0x50 [ 340.947972] ? __do_softirq+0x611/0xa84 [ 340.951965] ? irq_exit+0x250/0x290 [ 340.955609] ? exiting_irq+0xe/0x10 [ 340.959256] ? smp_apic_timer_interrupt+0x64/0x90 [ 340.964119] ? apic_timer_interrupt+0xf/0x20 [ 340.968549] ? kmsan_internal_check_memory+0xa4/0x460 [ 340.973757] ? kmsan_check_memory+0xb/0x10 [ 340.978009] ? release_pages+0x395/0x1790 [ 340.982178] ? free_pages_and_swap_cache+0x55b/0x590 [ 340.987302] ? unmap_page_range+0x34a8/0x3db0 [ 340.991811] ? unmap_single_vma+0x445/0x5e0 [ 340.996155] ? unmap_vmas+0x251/0x380 [ 340.999987] ? exit_mmap+0x50e/0xa00 [ 341.003733] ? __mmput+0x16d/0x700 [ 341.007286] ? mmput+0x178/0x1f0 [ 341.010666] ? exit_mm+0xaf6/0xbd0 [ 341.014247] ? do_exit+0x101f/0x3f90 [ 341.017980] ? do_group_exit+0x1a0/0x350 [ 341.022060] ? get_signal+0x1693/0x2390 [ 341.026055] ? do_signal+0x1ed/0x2da0 [ 341.029869] ? prepare_exit_to_usermode+0x293/0x470 [ 341.035022] ? syscall_return_slowpath+0x112/0x880 [ 341.039966] ? do_syscall_64+0xe4/0x100 [ 341.043960] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 341.049353] ? __msan_get_context_state+0x9/0x30 [ 341.054122] ? INIT_INT+0xc/0x30 [ 341.057509] ? __kmalloc_node_track_caller+0x362/0x1420 [ 341.062900] ? gre_tap_xmit+0x4e6/0x910 [ 341.066898] kmsan_memcpy_origins+0x13d/0x1b0 [ 341.071426] __msan_memcpy+0x6f/0x80 [ 341.075161] pskb_expand_head+0x441/0x1d00 [ 341.079446] gre_tap_xmit+0x4e6/0x910 [ 341.083281] ? gre_tap_init+0x650/0x650 [ 341.087271] dev_hard_start_xmit+0x6b8/0xdb0 [ 341.091723] sch_direct_xmit+0x58a/0x880 [ 341.095824] __qdisc_run+0x1724/0x3530 [ 341.099736] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 341.105150] __dev_queue_xmit+0x1c30/0x3d90 [ 341.109529] dev_queue_xmit+0x4b/0x60 [ 341.113354] arp_send_dst+0xac8/0xbd0 [ 341.117191] ? arp_xmit+0x310/0x310 [ 341.120841] arp_solicit+0xda9/0xec0 [ 341.124608] ? arp_ifdown+0x60/0x60 [ 341.128248] ? arp_ifdown+0x60/0x60 [ 341.131901] neigh_probe+0x1ea/0x360 [ 341.135647] neigh_timer_handler+0xae1/0x12a0 [ 341.140185] call_timer_fn+0x326/0x700 [ 341.144093] ? neigh_blackhole+0x60/0x60 [ 341.148179] __run_timers+0xe75/0x12e0 [ 341.152085] ? neigh_blackhole+0x60/0x60 [ 341.156191] ? timers_dead_cpu+0xb00/0xb00 [ 341.160446] run_timer_softirq+0x2e/0x50 [ 341.164533] __do_softirq+0x611/0xa84 [ 341.168402] irq_exit+0x250/0x290 [ 341.171885] exiting_irq+0xe/0x10 [ 341.175358] smp_apic_timer_interrupt+0x64/0x90 [ 341.180538] apic_timer_interrupt+0xf/0x20 [ 341.184777] [ 341.187036] RIP: 0010:kmsan_internal_check_memory+0xa4/0x460 [ 341.192848] Code: f9 49 0f 47 cf 48 89 4d 88 48 c7 c1 ff ff ff ff 31 c0 48 89 45 c0 45 31 e4 48 c7 45 b8 ff ff ff ff 0f 1f 44 00 00 4c 8b 6d 88 <48> 83 f9 ff 74 37 48 8b 45 b0 42 8d 04 20 a9 ff 0f 00 00 74 17 48 [ 341.211761] RSP: 0018:ffff88017d4eef68 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 341.219496] RAX: 0000000000000000 RBX: ffff88017d4df000 RCX: ffff88017d4df000 [ 341.226784] RDX: 000000017d4df128 RSI: 0000000000000008 RDI: ffff88017d4ef128 [ 341.234187] RBP: ffff88017d4ef008 R08: ffff880000000000 R09: 0000000000000000 [ 341.241473] R10: ffffea0008074020 R11: 0000000000000002 R12: 0000000000000003 [ 341.248754] R13: 0000000000000008 R14: 0000000000000246 R15: 0000000000000005 [ 341.256101] kmsan_check_memory+0xb/0x10 [ 341.260182] release_pages+0x395/0x1790 [ 341.264184] ? lru_add_drain_cpu+0x67/0x4a0 [ 341.268519] ? lru_add_drain+0x25/0x30 [ 341.272455] free_pages_and_swap_cache+0x55b/0x590 [ 341.277430] unmap_page_range+0x34a8/0x3db0 [ 341.281855] unmap_single_vma+0x445/0x5e0 [ 341.286057] unmap_vmas+0x251/0x380 [ 341.289717] exit_mmap+0x50e/0xa00 [ 341.293308] __mmput+0x16d/0x700 [ 341.296691] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 341.302086] mmput+0x178/0x1f0 [ 341.305309] exit_mm+0xaf6/0xbd0 [ 341.308699] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.314096] do_exit+0x101f/0x3f90 [ 341.317667] ? trace_raw_output_signal_deliver+0x2d1/0x360 [ 341.323326] do_group_exit+0x1a0/0x350 [ 341.327244] get_signal+0x1693/0x2390 [ 341.331085] ? __msan_get_context_state+0x9/0x30 [ 341.335980] ? __msan_poison_alloca+0x1f0/0x2c0 [ 341.340678] ? do_signal+0x1d6/0x2da0 [ 341.344509] ? prepare_exit_to_usermode+0x293/0x470 [ 341.349549] do_signal+0x1ed/0x2da0 [ 341.353378] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.358765] ? balance_callback+0x48/0x260 [ 341.363021] ? finish_task_switch+0x182/0x340 [ 341.367550] ? __schedule+0x81e/0x9b0 [ 341.371398] prepare_exit_to_usermode+0x293/0x470 [ 341.376277] syscall_return_slowpath+0x112/0x880 [ 341.381096] do_syscall_64+0xe4/0x100 [ 341.384944] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 341.390157] RIP: 0033:0x457569 [ 341.393370] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.412320] RSP: 002b:00007f81acb93cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 341.420075] RAX: 0000000000000001 RBX: 000000000072bfa8 RCX: 0000000000457569 [ 341.427363] RDX: 00000000004c5060 RSI: 0000000000000081 RDI: 000000000072bfac [ 341.434745] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 341.442033] R10: 0000000000000005 R11: 0000000000000246 R12: 000000000072bfac [ 341.449323] R13: 0000000000a3fb7f R14: 00007f81acb949c0 R15: 0000000000000001 [ 341.456622] Uninit was stored to memory at: [ 341.460970] kmsan_internal_chain_origin+0x136/0x240 [ 341.466093] __msan_chain_origin+0x75/0xd0 [ 341.470347] __save_stack_trace+0x8b8/0xc60 [ 341.474682] save_stack_trace+0xa2/0xe0 [ 341.478672] kmsan_internal_chain_origin+0x136/0x240 [ 341.483790] kmsan_memcpy_origins+0x13d/0x1b0 [ 341.488300] __msan_memcpy+0x6f/0x80 [ 341.492122] pskb_expand_head+0x441/0x1d00 [ 341.496366] gre_tap_xmit+0x4e6/0x910 [ 341.500179] dev_hard_start_xmit+0x6b8/0xdb0 [ 341.504600] sch_direct_xmit+0x58a/0x880 [ 341.508671] __qdisc_run+0x1724/0x3530 [ 341.512570] __dev_queue_xmit+0x1c30/0x3d90 [ 341.516904] dev_queue_xmit+0x4b/0x60 [ 341.520720] arp_send_dst+0xac8/0xbd0 [ 341.524533] arp_solicit+0xda9/0xec0 [ 341.528257] neigh_probe+0x1ea/0x360 [ 341.531983] neigh_timer_handler+0xae1/0x12a0 [ 341.536504] call_timer_fn+0x326/0x700 [ 341.540411] __run_timers+0xe75/0x12e0 [ 341.544311] run_timer_softirq+0x2e/0x50 [ 341.548387] __do_softirq+0x611/0xa84 [ 341.552190] [ 341.553821] Uninit was stored to memory at: [ 341.558158] kmsan_internal_chain_origin+0x136/0x240 [ 341.563275] __msan_chain_origin+0x75/0xd0 [ 341.567530] __save_stack_trace+0x8b8/0xc60 [ 341.571870] save_stack_trace+0xa2/0xe0 [ 341.575862] kmsan_internal_chain_origin+0x136/0x240 [ 341.580995] kmsan_memcpy_origins+0x13d/0x1b0 [ 341.585510] __msan_memcpy+0x6f/0x80 [ 341.589234] pskb_expand_head+0x441/0x1d00 [ 341.593486] gre_tap_xmit+0x4e6/0x910 [ 341.597300] dev_hard_start_xmit+0x6b8/0xdb0 [ 341.601717] sch_direct_xmit+0x58a/0x880 [ 341.605787] __qdisc_run+0x1724/0x3530 [ 341.609686] __dev_queue_xmit+0x1c30/0x3d90 [ 341.614023] dev_queue_xmit+0x4b/0x60 [ 341.617834] arp_send_dst+0xac8/0xbd0 [ 341.621649] arp_solicit+0xda9/0xec0 [ 341.625376] neigh_probe+0x1ea/0x360 [ 341.629100] neigh_timer_handler+0xae1/0x12a0 [ 341.633849] call_timer_fn+0x326/0x700 [ 341.637881] __run_timers+0xe75/0x12e0 [ 341.641785] run_timer_softirq+0x2e/0x50 [ 341.645870] __do_softirq+0x611/0xa84 [ 341.649670] [ 341.651297] Uninit was stored to memory at: [ 341.655633] kmsan_internal_chain_origin+0x136/0x240 [ 341.660753] __msan_chain_origin+0x75/0xd0 [ 341.665004] __save_stack_trace+0x8b8/0xc60 [ 341.669338] save_stack_trace+0xa2/0xe0 [ 341.673333] kmsan_internal_chain_origin+0x136/0x240 [ 341.678449] kmsan_memcpy_origins+0x13d/0x1b0 [ 341.682964] __msan_memcpy+0x6f/0x80 [ 341.686777] pskb_expand_head+0x441/0x1d00 [ 341.691020] gre_tap_xmit+0x4e6/0x910 [ 341.694836] dev_hard_start_xmit+0x6b8/0xdb0 [ 341.699252] sch_direct_xmit+0x58a/0x880 [ 341.703326] __qdisc_run+0x1724/0x3530 [ 341.707224] __dev_queue_xmit+0x1c30/0x3d90 [ 341.711557] dev_queue_xmit+0x4b/0x60 [ 341.715370] arp_send_dst+0xac8/0xbd0 [ 341.719180] arp_solicit+0xda9/0xec0 [ 341.722905] neigh_probe+0x1ea/0x360 [ 341.726629] neigh_timer_handler+0xae1/0x12a0 [ 341.731140] call_timer_fn+0x326/0x700 [ 341.735062] __run_timers+0xe75/0x12e0 [ 341.738960] run_timer_softirq+0x2e/0x50 [ 341.743039] __do_softirq+0x611/0xa84 [ 341.746842] [ 341.748475] Uninit was stored to memory at: [ 341.752816] kmsan_internal_chain_origin+0x136/0x240 [ 341.757934] __msan_chain_origin+0x75/0xd0 [ 341.762189] __save_stack_trace+0x8b8/0xc60 [ 341.766528] save_stack_trace+0xa2/0xe0 [ 341.770521] kmsan_internal_chain_origin+0x136/0x240 [ 341.775641] kmsan_memcpy_origins+0x13d/0x1b0 [ 341.780147] __msan_memcpy+0x6f/0x80 [ 341.784048] pskb_expand_head+0x441/0x1d00 [ 341.788300] gre_tap_xmit+0x4e6/0x910 [ 341.792113] dev_hard_start_xmit+0x6b8/0xdb0 [ 341.796535] sch_direct_xmit+0x58a/0x880 [ 341.800606] __qdisc_run+0x1724/0x3530 [ 341.804509] __dev_queue_xmit+0x1c30/0x3d90 [ 341.808840] dev_queue_xmit+0x4b/0x60 [ 341.812656] arp_send_dst+0xac8/0xbd0 [ 341.816474] arp_solicit+0xda9/0xec0 [ 341.820204] neigh_probe+0x1ea/0x360 [ 341.823929] neigh_timer_handler+0xae1/0x12a0 [ 341.828437] call_timer_fn+0x326/0x700 [ 341.832354] __run_timers+0xe75/0x12e0 [ 341.836374] run_timer_softirq+0x2e/0x50 [ 341.840443] __do_softirq+0x611/0xa84 [ 341.844250] [ 341.845879] Uninit was stored to memory at: [ 341.850217] kmsan_internal_chain_origin+0x136/0x240 [ 341.855338] __msan_chain_origin+0x75/0xd0 [ 341.859593] __save_stack_trace+0x8b8/0xc60 [ 341.863927] save_stack_trace+0xa2/0xe0 [ 341.867919] kmsan_internal_chain_origin+0x136/0x240 [ 341.873038] kmsan_memcpy_origins+0x13d/0x1b0 [ 341.877551] __msan_memcpy+0x6f/0x80 [ 341.881277] pskb_expand_head+0x441/0x1d00 [ 341.885526] gre_tap_xmit+0x4e6/0x910 [ 341.889342] dev_hard_start_xmit+0x6b8/0xdb0 [ 341.893767] sch_direct_xmit+0x58a/0x880 [ 341.897842] __qdisc_run+0x1724/0x3530 [ 341.901745] __dev_queue_xmit+0x1c30/0x3d90 [ 341.906085] dev_queue_xmit+0x4b/0x60 [ 341.909902] arp_send_dst+0xac8/0xbd0 [ 341.913715] arp_solicit+0xda9/0xec0 [ 341.917445] neigh_probe+0x1ea/0x360 [ 341.921185] neigh_timer_handler+0xae1/0x12a0 [ 341.925703] call_timer_fn+0x326/0x700 [ 341.929604] __run_timers+0xe75/0x12e0 [ 341.933508] run_timer_softirq+0x2e/0x50 [ 341.937592] __do_softirq+0x611/0xa84 [ 341.941391] [ 341.943026] Uninit was stored to memory at: [ 341.947365] kmsan_internal_chain_origin+0x136/0x240 [ 341.952492] __msan_chain_origin+0x75/0xd0 [ 341.956748] __save_stack_trace+0x8b8/0xc60 [ 341.961082] save_stack_trace+0xa2/0xe0 [ 341.965072] kmsan_internal_chain_origin+0x136/0x240 [ 341.970220] kmsan_memcpy_origins+0x13d/0x1b0 [ 341.974731] __msan_memcpy+0x6f/0x80 [ 341.978456] pskb_expand_head+0x441/0x1d00 [ 341.982711] gre_tap_xmit+0x4e6/0x910 [ 341.986525] dev_hard_start_xmit+0x6b8/0xdb0 [ 341.990946] sch_direct_xmit+0x58a/0x880 [ 341.995021] __qdisc_run+0x1724/0x3530 [ 341.998950] __dev_queue_xmit+0x1c30/0x3d90 [ 342.003321] dev_queue_xmit+0x4b/0x60 [ 342.007135] arp_send_dst+0xac8/0xbd0 [ 342.010952] arp_solicit+0xda9/0xec0 [ 342.014679] neigh_probe+0x1ea/0x360 [ 342.018403] neigh_timer_handler+0xae1/0x12a0 [ 342.022915] call_timer_fn+0x326/0x700 [ 342.026817] __run_timers+0xe75/0x12e0 [ 342.030724] run_timer_softirq+0x2e/0x50 [ 342.034803] __do_softirq+0x611/0xa84 [ 342.038619] [ 342.040250] Uninit was stored to memory at: [ 342.044598] kmsan_internal_chain_origin+0x136/0x240 [ 342.049713] __msan_chain_origin+0x75/0xd0 [ 342.053961] __save_stack_trace+0x8b8/0xc60 [ 342.058297] save_stack_trace+0xa2/0xe0 [ 342.062291] kmsan_internal_chain_origin+0x136/0x240 [ 342.067406] kmsan_memcpy_origins+0x13d/0x1b0 [ 342.071916] __msan_memcpy+0x6f/0x80 [ 342.075645] pskb_expand_head+0x441/0x1d00 [ 342.079892] gre_tap_xmit+0x4e6/0x910 [ 342.083712] dev_hard_start_xmit+0x6b8/0xdb0 [ 342.088134] sch_direct_xmit+0x58a/0x880 [ 342.092209] __qdisc_run+0x1724/0x3530 [ 342.096128] __dev_queue_xmit+0x1c30/0x3d90 [ 342.100459] dev_queue_xmit+0x4b/0x60 [ 342.104285] arp_send_dst+0xac8/0xbd0 [ 342.108102] arp_solicit+0xda9/0xec0 [ 342.111833] neigh_probe+0x1ea/0x360 [ 342.115563] neigh_timer_handler+0xae1/0x12a0 [ 342.120073] call_timer_fn+0x326/0x700 [ 342.123989] __run_timers+0xe75/0x12e0 [ 342.127891] run_timer_softirq+0x2e/0x50 [ 342.131970] __do_softirq+0x611/0xa84 [ 342.135953] [ 342.137663] Local variable description: ----__ai_new.i@sched_clock_cpu [ 342.144332] Variable was created at: [ 342.148067] sched_clock_cpu+0x75/0x740 [ 342.152052] select_idle_sibling+0x1082/0x1610 17:25:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d024031") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 342.214861] binder: 8771:8772 unknown command 536871424 [ 342.220454] binder: 8771:8772 ioctl c0306201 20000440 returned -22 [ 342.266596] binder_alloc: binder_alloc_mmap_handler: 8771 20001000-20002000 already mapped failed -16 [ 342.283207] audit: type=1326 audit(1541006725.328:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8738 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 342.370793] binder: BINDER_SET_CONTEXT_MGR already set [ 342.376539] binder: 8771:8772 ioctl 40046207 0 returned -16 17:25:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') read$FUSE(r0, &(0x7f0000000140), 0x1000) 17:25:25 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@kern={0x10, 0xa0017b00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090035000c001c0000000d000580fe00ff000000c78b80082314e9030b9d566885b16732009b0d00b1df136ef75afb0000000000000005", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) 17:25:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00\x00\x00'], 0x1}}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0)=0x4adb, 0x13) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)) 17:25:25 executing program 5: open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)="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", 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0xa3}, 0x621) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) msgsnd(0x0, &(0x7f0000000100), 0x8, 0x0) [ 342.579932] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 342.586657] IPv6: NLM_F_CREATE should be set when creating new route [ 342.589100] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 342.593341] IPv6: NLM_F_CREATE should be set when creating new route 17:25:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d024031") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:25 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x60000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_IO(r0, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x40000, &(0x7f0000000440)}, &(0x7f0000000580)="5f39203a1ec6", &(0x7f00000004c0)=""/44, 0x0, 0x0, 0x0, &(0x7f0000000600)}) 17:25:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80, 0x1c00000000000000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:25:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d024031") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00\x00\x00'], 0x1}}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0)=0x4adb, 0x13) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)) 17:25:26 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000440)=""/217) 17:25:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f0000000040)) [ 343.572861] audit: type=1326 audit(1541006726.618:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8813 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d024031628571") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:26 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x60000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000240)=""/97) 17:25:26 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f00000000c0)=""/132) 17:25:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d024031628571") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000b9c000)) 17:25:27 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x60000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) [ 344.313211] audit: type=1326 audit(1541006727.368:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8813 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 344.390089] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) [ 344.407466] audit: type=1326 audit(1541006727.398:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8848 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) lookup_dcookie(0x0, &(0x7f0000000300)=""/145, 0x91) 17:25:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) alarm(0x0) 17:25:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d024031628571") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000240)='.\x00', 0x80000002) [ 344.731296] audit: type=1326 audit(1541006727.778:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8859 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:27 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x60000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000700), 0x14) 17:25:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d02403162857170") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 344.951299] audit: type=1326 audit(1541006727.998:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8868 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) io_setup(0x3, &(0x7f0000000000)=0x0) io_destroy(r0) 17:25:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d02403162857170") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 345.465904] audit: type=1326 audit(1541006728.518:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8888 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) [ 345.519197] audit: type=1326 audit(1541006728.548:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8859 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 345.651126] audit: type=1326 audit(1541006728.638:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8868 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d02403162857170") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:25:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 17:25:28 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) remap_file_pages(&(0x7f0000ff7000/0x7000)=nil, 0x7000, 0x2000008, 0x0, 0x0) 17:25:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:29 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x60000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:29 executing program 2: perf_event_open(&(0x7f0000c86f88)={0x2, 0x182, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 346.103889] mmap: syz-executor3 (8908) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 346.177613] audit: type=1326 audit(1541006729.228:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8888 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000180)=""/241) 17:25:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffdfffffffe}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480)=""/222, 0xffffffd7) 17:25:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha256_mb\x00'}, 0x58) 17:25:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0x0, 0x0, 0x0, @msi}]}) 17:25:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) [ 346.678810] audit: type=1326 audit(1541006729.728:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8932 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000180)=""/241) 17:25:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:30 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x60000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:25:30 executing program 3: r0 = add_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='`', 0x1, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) [ 347.427783] audit: type=1326 audit(1541006730.478:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8932 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:30 executing program 2: seccomp(0x40000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) set_robust_list(&(0x7f00000001c0)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, 0x18) 17:25:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @loopback}, &(0x7f0000000040)=0xc) [ 347.675614] audit: type=1326 audit(1541006730.728:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8971 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:30 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/autofs\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[{0x0, 0x40}, {0xb, 0x5}, {}], 0x3) 17:25:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) epoll_pwait(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000980), 0x8) 17:25:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) [ 347.917437] audit: type=1326 audit(1541006730.968:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8980 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:31 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) write$P9_RXATTRCREATE(r1, &(0x7f0000000040)={0x7}, 0x7) sysfs$1(0x1, &(0x7f0000000000)="937573657200") fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='mime_type\x00', 0xa, 0x3) 17:25:31 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x60000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:31 executing program 4: open$dir(&(0x7f0000001380)='./file1\x00', 0x440, 0x40) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000200)='./file1\x00', &(0x7f0000000180), &(0x7f0000000b40)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000400)={'filter\x00', 0x2, [{}, {}]}, 0x48) 17:25:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) [ 348.268935] misc userio: The device must be registered before sending interrupts 17:25:31 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000080)) r0 = creat(&(0x7f0000000140)='./file1\x00', 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0x7) [ 348.353476] misc userio: The device must be registered before sending interrupts [ 348.449538] audit: type=1326 audit(1541006731.498:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8971 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:31 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) read(r0, &(0x7f0000000300)=""/11, 0x9c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000100)) [ 348.730812] audit: type=1326 audit(1541006731.778:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8980 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000002c0)=0x100000001, 0x118) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000100)=ANY=[@ANYBLOB="090000000000000022000000e000000200001700000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000001f0000000000000000000000000000000000000000000000000000000000000000000000000000001593000000000017f87efc03dcae000000000000000000000000000000000000000000000000c1ea7aab0d76e6ce64a8b3ed00f54aef61ba71721e5e268eec10c719d5aa5645ae3e2af3c6b0c942d90e416dbd0c69874071abee021b197beb9d0ab7"], 0x1) 17:25:31 executing program 1: 17:25:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:32 executing program 3: 17:25:32 executing program 2: 17:25:32 executing program 1: 17:25:32 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:32 executing program 2: 17:25:32 executing program 4: 17:25:32 executing program 3: 17:25:32 executing program 1: 17:25:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:33 executing program 4: 17:25:33 executing program 2: 17:25:33 executing program 3: 17:25:33 executing program 1: 17:25:33 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:33 executing program 4: [ 350.434043] misc userio: No port type given on /dev/userio 17:25:33 executing program 2: [ 350.478053] misc userio: The device must be registered before sending interrupts 17:25:33 executing program 1: [ 350.537731] misc userio: The device must be registered before sending interrupts 17:25:33 executing program 3: 17:25:33 executing program 2: 17:25:33 executing program 1: 17:25:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:33 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:34 executing program 4: 17:25:34 executing program 1: 17:25:34 executing program 3: 17:25:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:34 executing program 2: 17:25:34 executing program 4: 17:25:34 executing program 1: 17:25:34 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:34 executing program 2: 17:25:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:34 executing program 3: 17:25:35 executing program 4: 17:25:35 executing program 1: 17:25:35 executing program 2: 17:25:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:35 executing program 3: 17:25:35 executing program 4: 17:25:35 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:35 executing program 2: 17:25:35 executing program 1: 17:25:35 executing program 3: 17:25:35 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:35 executing program 4: 17:25:36 executing program 2: 17:25:36 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:36 executing program 3: 17:25:36 executing program 1: 17:25:36 executing program 4: 17:25:36 executing program 2: 17:25:36 executing program 1: 17:25:36 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:36 executing program 3: 17:25:36 executing program 2: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@loopback}, 0x20) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000180)) syslog(0x2, &(0x7f00000005c0)=""/177, 0xb1) 17:25:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x900}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800110300001900000000000a0000000000000000000000140005000000000009ffff0000000000000000017c05259311c8a4de29ec3d59291c46cb90086b4aa28f817fa68f47c6e428ee138e5a0521873b7a03704749"], 0x1}}, 0x0) 17:25:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x4c00) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 17:25:37 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:37 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendto(r1, &(0x7f0000000a80)="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", 0x150, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000013f80)=[{{&(0x7f000000df00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f000000f200)=[{&(0x7f000000df80)=""/53, 0x35}, {&(0x7f000000e040)=""/205, 0xcd}, {&(0x7f000000e140)=""/4096, 0x1000}], 0x3, &(0x7f000000f280)=""/167, 0xa7}}], 0x1, 0x0, &(0x7f0000014200)) 17:25:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r0, &(0x7f0000000040), 0x1c) 17:25:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:37 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x4c00) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 17:25:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) 17:25:37 executing program 1: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendto$inet6(r0, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000001d00)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:25:37 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000000)={0x0, 0x0, 0x0, {}, {}, @rumble}) 17:25:38 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:38 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) [ 354.942079] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:25:38 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:38 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={0x0, 0x8}, 0x10) 17:25:38 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:38 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:41 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) signalfd4(r0, &(0x7f0000000000), 0x8, 0x0) 17:25:41 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1000, 0x6000) 17:25:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_emit_ethernet(0x2e, &(0x7f0000000100)={@local, @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0xffffff94, 0x4}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)) 17:25:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:41 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000080)) 17:25:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffdfffffffe}]}) execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f0000000580), &(0x7f00000006c0), 0x0) 17:25:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffdfffffffe}]}) setuid(0x0) 17:25:42 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) [ 359.402741] audit: type=1326 audit(1541006742.448:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9276 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 359.516713] audit: type=1326 audit(1541006742.568:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9279 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:42 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:42 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) utimes(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={{0x0, 0x2710}}) 17:25:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:43 executing program 4: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) [ 359.946912] audit: type=1326 audit(1541006742.998:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9300 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:43 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) [ 360.121602] audit: type=1326 audit(1541006743.168:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9276 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 360.246253] audit: type=1326 audit(1541006743.238:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9279 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mlockall(0x7) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 17:25:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) fchmod(0xffffffffffffffff, 0x0) 17:25:43 executing program 4: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:43 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) [ 360.592522] audit: type=1326 audit(1541006743.638:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9319 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 360.760834] audit: type=1326 audit(1541006743.808:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9300 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:44 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)}, &(0x7f0000000400)) 17:25:44 executing program 4: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffdfffffffe}]}) r0 = socket$inet6(0xa, 0x80003, 0x1) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 361.284225] audit: type=1326 audit(1541006744.338:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9345 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0), 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) [ 361.406496] audit: type=1326 audit(1541006744.368:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9348 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 361.428895] audit: type=1326 audit(1541006744.428:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9319 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:44 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000280)) 17:25:44 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0", 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:45 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf", 0xc) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:45 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:45 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 17:25:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd", 0xe) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x31, 0x0, @thr={&(0x7f00000000c0), &(0x7f0000000180)}}, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000240)) 17:25:45 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:25:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b", 0xf) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) eventfd(0x0) 17:25:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:46 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffdfffffffe}]}) epoll_create1(0x0) 17:25:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:47 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffdfffffffe}]}) set_tid_address(&(0x7f0000000000)) 17:25:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffdfffffffe}]}) personality(0x0) [ 364.420068] kauditd_printk_skb: 11 callbacks suppressed [ 364.420108] audit: type=1326 audit(1541006747.468:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9456 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) [ 364.544647] audit: type=1326 audit(1541006747.508:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9454 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:47 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) [ 364.739531] audit: type=1326 audit(1541006747.788:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9436 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040), 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:47 executing program 2: pipe(&(0x7f0000000180)) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 17:25:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) [ 365.109302] audit: type=1326 audit(1541006748.158:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9454 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 365.204700] audit: type=1326 audit(1541006748.258:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9456 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 17:25:48 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:48 executing program 2: 17:25:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040), 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:48 executing program 1: 17:25:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:48 executing program 3: 17:25:48 executing program 2: creat(&(0x7f000002bff8)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={0xfffffffffffffffe}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000fa4000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0xa400295c) fcntl$notify(r0, 0xa, 0x34) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) dup2(r0, r2) 17:25:48 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040), 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:49 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:49 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:49 executing program 2: 17:25:49 executing program 2: 17:25:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:49 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:49 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:49 executing program 3: [ 366.949772] misc userio: No port type given on /dev/userio [ 366.976402] misc userio: The device must be registered before sending interrupts 17:25:50 executing program 2: [ 367.035178] misc userio: The device must be registered before sending interrupts 17:25:50 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:50 executing program 3: 17:25:50 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300), 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:50 executing program 2: [ 367.644538] misc userio: No port type given on /dev/userio 17:25:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:50 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) [ 367.688861] misc userio: The device must be registered before sending interrupts 17:25:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) [ 367.737008] misc userio: The device must be registered before sending interrupts 17:25:51 executing program 2: 17:25:51 executing program 3: 17:25:51 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:51 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) [ 368.293285] misc userio: The device must be registered before sending interrupts [ 368.358555] misc userio: The device must be registered before sending interrupts 17:25:51 executing program 2: 17:25:51 executing program 3: 17:25:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:51 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:51 executing program 2: 17:25:51 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:52 executing program 3: 17:25:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:52 executing program 2: 17:25:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:52 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:52 executing program 3: 17:25:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:52 executing program 2: 17:25:52 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:52 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:52 executing program 3: 17:25:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:53 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:53 executing program 2: 17:25:53 executing program 3: 17:25:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:53 executing program 2: 17:25:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:53 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:53 executing program 3: 17:25:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:54 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:54 executing program 2: 17:25:54 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:54 executing program 3: 17:25:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:54 executing program 2: 17:25:54 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:54 executing program 3: 17:25:54 executing program 2: 17:25:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:54 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:55 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:55 executing program 3: 17:25:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:55 executing program 2: 17:25:55 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:55 executing program 3: 17:25:55 executing program 2: 17:25:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:55 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x3e, &(0x7f0000000400)={@local, @link_local={0x3a, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 17:25:55 executing program 3: 17:25:56 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:56 executing program 2: 17:25:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:56 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:56 executing program 3: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r1, &(0x7f0000000200)="0304001fecffffffffff7f006df55b0dfa938207d9fb3780", 0x18, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) rt_sigsuspend(&(0x7f0000000040), 0x8) getgroups(0x0, &(0x7f0000001ec0)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000003240)) 17:25:56 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:56 executing program 2: socketpair(0x18, 0x0, 0x4, &(0x7f0000000040)) 17:25:56 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) 17:25:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:56 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000002c0)={0x0, 0x0}) ptrace$getenv(0x4201, r0, 0x200, &(0x7f0000000300)) socketpair$unix(0x1, 0x400000000000002, 0x0, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x1, 0x0) socketpair$inet6(0xa, 0x6, 0x9, &(0x7f0000000280)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x4302}) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000100)) set_mempolicy(0x1, &(0x7f0000000080)=0x3, 0x4) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) 17:25:56 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:57 executing program 4: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:57 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:57 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080), 0x2) 17:25:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) 17:25:57 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:57 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:57 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:58 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:58 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:58 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:25:58 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:25:58 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:26:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:26:00 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:26:00 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:26:00 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:26:00 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080), 0x2) 17:26:00 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) 17:26:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:26:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 377.662114] psmouse serio38: Failed to reset mouse on : -5 17:26:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 17:26:00 executing program 4 (fault-call:3 fault-nth:0): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) 17:26:00 executing program 1 (fault-call:8 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) [ 378.005061] FAULT_INJECTION: forcing a failure. [ 378.005061] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 378.017286] CPU: 1 PID: 9851 Comm: syz-executor4 Not tainted 4.19.0+ #76 [ 378.024187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.028771] FAULT_INJECTION: forcing a failure. [ 378.028771] name failslab, interval 1, probability 0, space 0, times 1 [ 378.034033] Call Trace: [ 378.034111] dump_stack+0x306/0x460 [ 378.034181] should_fail+0x1170/0x1350 [ 378.034260] __alloc_pages_nodemask+0x6ec/0x64d0 [ 378.034361] ? ima_get_action+0x14b/0x160 [ 378.034449] alloc_pages_current+0x531/0x760 [ 378.069108] skb_page_frag_refill+0x46e/0x790 [ 378.073672] ? kmsan_set_origin+0x83/0x130 [ 378.078035] tun_get_user+0x11e4/0x8b40 [ 378.082119] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 378.087597] ? uevent_filter+0x80/0x80 [ 378.091635] tun_chr_write_iter+0x1d4/0x330 [ 378.096032] ? tun_chr_read_iter+0x450/0x450 [ 378.100507] do_iter_readv_writev+0x822/0xab0 [ 378.105096] ? tun_chr_read_iter+0x450/0x450 [ 378.109572] do_iter_write+0x302/0xd80 [ 378.113544] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 378.119050] ? import_iovec+0x3b6/0x5f0 [ 378.123158] do_writev+0x3d8/0x860 [ 378.126814] ? syscall_return_slowpath+0x112/0x880 [ 378.131800] ? __se_sys_write+0x306/0x370 [ 378.136537] __se_sys_writev+0x9b/0xb0 [ 378.140531] __x64_sys_writev+0x4a/0x70 [ 378.144570] do_syscall_64+0xbe/0x100 [ 378.148434] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 378.153696] RIP: 0033:0x457421 [ 378.156948] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 378.175930] RSP: 002b:00007f379691eba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 378.183890] RAX: ffffffffffffffda RBX: 000000000000003e RCX: 0000000000457421 [ 378.191233] RDX: 0000000000000001 RSI: 00007f379691ebf0 RDI: 00000000000000f0 [ 378.198552] RBP: 0000000020000500 R08: 00000000000000f0 R09: 0000000000000000 [ 378.205866] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f379691f6d4 [ 378.213181] R13: 00000000004c4b01 R14: 00000000004d8098 R15: 0000000000000004 [ 378.220539] CPU: 0 PID: 9853 Comm: syz-executor1 Not tainted 4.19.0+ #76 [ 378.227430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.237097] Call Trace: [ 378.239773] dump_stack+0x306/0x460 [ 378.243505] should_fail+0x1170/0x1350 [ 378.247511] __should_failslab+0x278/0x2a0 [ 378.251877] should_failslab+0x29/0x70 [ 378.255836] __kmalloc+0xcf/0x440 [ 378.259364] ? sock_kmalloc+0x2a6/0x560 [ 378.263410] sock_kmalloc+0x2a6/0x560 [ 378.267345] af_alg_alloc_areq+0x85/0x310 [ 378.271602] skcipher_recvmsg+0x32a/0x18a0 [ 378.275940] sock_recvmsg+0x1d6/0x230 [ 378.279807] ? skcipher_sendmsg+0x160/0x160 [ 378.284198] ___sys_recvmsg+0x459/0xae0 [ 378.288513] ? __fdget+0x318/0x430 [ 378.292130] __sys_recvmmsg+0x656/0x1120 [ 378.296300] ? kmsan_set_origin+0x83/0x130 [ 378.300634] do_sys_recvmmsg+0x2b5/0x400 17:26:01 executing program 4 (fault-call:3 fault-nth:1): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) [ 378.304805] __se_sys_recvmmsg+0xdd/0x100 [ 378.309062] __x64_sys_recvmmsg+0x62/0x80 [ 378.313322] do_syscall_64+0xbe/0x100 [ 378.317196] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 378.322445] RIP: 0033:0x457569 [ 378.325707] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 378.344669] RSP: 002b:00007fcdf7859c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 378.352452] RAX: ffffffffffffffda RBX: 00007fcdf7859c90 RCX: 0000000000457569 [ 378.359782] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000006 [ 378.367105] RBP: 000000000072bf00 R08: 0000000020005c00 R09: 0000000000000000 [ 378.374436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcdf785a6d4 [ 378.381775] R13: 00000000004c34b5 R14: 00000000004d52f0 R15: 0000000000000007 17:26:01 executing program 1 (fault-call:8 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x156) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1, 0x0, &(0x7f0000005c00)={0x77359400}) [ 378.455891] FAULT_INJECTION: forcing a failure. [ 378.455891] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 378.467768] CPU: 0 PID: 9856 Comm: syz-executor4 Not tainted 4.19.0+ #76 [ 378.474624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.483999] Call Trace: [ 378.486621] dump_stack+0x306/0x460 [ 378.490297] should_fail+0x1170/0x1350 [ 378.494234] ? __msan_memset+0x29/0xf0 [ 378.498170] __alloc_pages_nodemask+0x6ec/0x64d0 [ 378.502975] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 378.508413] ? __msan_poison_alloca+0x1f0/0x2c0 [ 378.513135] ? __inc_numa_state+0x98/0x480 [ 378.517405] ? zone_statistics+0x255/0x2e0 [ 378.521712] kmsan_internal_alloc_meta_for_pages+0x9d/0x740 [ 378.527451] ? kmsan_set_origin+0x83/0x130 [ 378.531734] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 378.537153] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 378.542638] ? prep_compound_page+0x47b/0x550 [ 378.547184] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 378.552683] ? get_page_from_freelist+0x1694/0x1d20 [ 378.557786] kmsan_alloc_page+0x7f/0xe0 [ 378.561811] __alloc_pages_nodemask+0x127c/0x64d0 [ 378.566744] ? ima_get_action+0x14b/0x160 [ 378.570975] alloc_pages_current+0x531/0x760 [ 378.575440] skb_page_frag_refill+0x46e/0x790 [ 378.579983] ? kmsan_set_origin+0x83/0x130 [ 378.584276] tun_get_user+0x11e4/0x8b40 [ 378.588313] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 378.591300] FAULT_INJECTION: forcing a failure. [ 378.591300] name failslab, interval 1, probability 0, space 0, times 0 [ 378.593769] tun_chr_write_iter+0x1d4/0x330 [ 378.593815] ? tun_chr_read_iter+0x450/0x450 [ 378.593846] do_iter_readv_writev+0x822/0xab0 [ 378.593901] ? tun_chr_read_iter+0x450/0x450 [ 378.593925] do_iter_write+0x302/0xd80 [ 378.593965] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 378.593989] ? import_iovec+0x3b6/0x5f0 [ 378.594050] do_writev+0x3d8/0x860 [ 378.639769] ? syscall_return_slowpath+0x112/0x880 [ 378.644739] ? __se_sys_write+0x306/0x370 [ 378.648917] __se_sys_writev+0x9b/0xb0 [ 378.652844] __x64_sys_writev+0x4a/0x70 [ 378.656842] do_syscall_64+0xbe/0x100 [ 378.660671] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 378.665881] RIP: 0033:0x457421 [ 378.669094] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 378.688016] RSP: 002b:00007f379691eba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 378.695754] RAX: ffffffffffffffda RBX: 000000000000003e RCX: 0000000000457421 [ 378.703042] RDX: 0000000000000001 RSI: 00007f379691ebf0 RDI: 00000000000000f0 [ 378.710326] RBP: 0000000020000500 R08: 00000000000000f0 R09: 0000000000000000 [ 378.717613] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f379691f6d4 [ 378.724899] R13: 00000000004c4b01 R14: 00000000004d8098 R15: 0000000000000004 [ 378.732239] CPU: 1 PID: 9859 Comm: syz-executor1 Not tainted 4.19.0+ #76 [ 378.739653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.749053] Call Trace: [ 378.751724] dump_stack+0x306/0x460 [ 378.755482] should_fail+0x1170/0x1350 [ 378.759480] __should_failslab+0x278/0x2a0 [ 378.763810] should_failslab+0x29/0x70 [ 378.767763] __kmalloc+0xcf/0x440 [ 378.771294] ? sock_kmalloc+0x2a6/0x560 [ 378.775344] sock_kmalloc+0x2a6/0x560 [ 378.779261] skcipher_recvmsg+0x984/0x18a0 [ 378.783610] sock_recvmsg+0x1d6/0x230 [ 378.787496] ? skcipher_sendmsg+0x160/0x160 [ 378.791923] ___sys_recvmsg+0x459/0xae0 [ 378.796053] ? __fdget+0x318/0x430 [ 378.799703] __sys_recvmmsg+0x656/0x1120 [ 378.803884] ? kmsan_set_origin+0x83/0x130 [ 378.808218] do_sys_recvmmsg+0x2b5/0x400 [ 378.812395] __se_sys_recvmmsg+0xdd/0x100 [ 378.816656] __x64_sys_recvmmsg+0x62/0x80 [ 378.820872] do_syscall_64+0xbe/0x100 [ 378.824744] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 378.829993] RIP: 0033:0x457569 [ 378.833245] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:26:01 executing program 4 (fault-call:3 fault-nth:2): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000080)) [ 378.852656] RSP: 002b:00007fcdf7859c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 378.860462] RAX: ffffffffffffffda RBX: 00007fcdf7859c90 RCX: 0000000000457569 [ 378.867785] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000006 [ 378.875110] RBP: 000000000072bf00 R08: 0000000020005c00 R09: 0000000000000000 [ 378.882434] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcdf785a6d4 [ 378.889764] R13: 00000000004c34b5 R14: 00000000004d52f0 R15: 0000000000000007 [ 379.018503] FAULT_INJECTION: forcing a failure. [ 379.018503] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 379.030382] CPU: 1 PID: 9862 Comm: syz-executor4 Not tainted 4.19.0+ #76 [ 379.037737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.047129] Call Trace: [ 379.049759] dump_stack+0x306/0x460 [ 379.053421] should_fail+0x1170/0x1350 [ 379.057354] ? __msan_memset+0x29/0xf0 [ 379.061293] __alloc_pages_nodemask+0x6ec/0x64d0 [ 379.066103] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 379.071543] ? __msan_poison_alloca+0x1f0/0x2c0 [ 379.076297] kmsan_internal_alloc_meta_for_pages+0x109/0x740 [ 379.082138] ? kmsan_set_origin+0x83/0x130 [ 379.086414] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 379.091823] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 379.097309] ? prep_compound_page+0x47b/0x550 [ 379.101861] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 379.107347] ? get_page_from_freelist+0x1694/0x1d20 [ 379.112406] kmsan_alloc_page+0x7f/0xe0 [ 379.116413] __alloc_pages_nodemask+0x127c/0x64d0 [ 379.121324] ? ima_get_action+0x14b/0x160 [ 379.125503] alloc_pages_current+0x531/0x760 [ 379.129930] skb_page_frag_refill+0x46e/0x790 [ 379.134435] ? kmsan_set_origin+0x83/0x130 [ 379.139071] tun_get_user+0x11e4/0x8b40 [ 379.143077] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 379.148523] tun_chr_write_iter+0x1d4/0x330 [ 379.152895] ? tun_chr_read_iter+0x450/0x450 [ 379.157333] do_iter_readv_writev+0x822/0xab0 [ 379.161899] ? tun_chr_read_iter+0x450/0x450 [ 379.166352] do_iter_write+0x302/0xd80 [ 379.170300] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 379.175773] ? import_iovec+0x3b6/0x5f0 [ 379.179790] do_writev+0x3d8/0x860 [ 379.183400] ? syscall_return_slowpath+0x112/0x880 [ 379.188379] ? __se_sys_write+0x306/0x370 [ 379.192572] __se_sys_writev+0x9b/0xb0 [ 379.196507] __x64_sys_writev+0x4a/0x70 [ 379.200524] do_syscall_64+0xbe/0x100 [ 379.204370] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 379.209590] RIP: 0033:0x457421 [ 379.212819] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 379.231763] RSP: 002b:00007f379691eba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 379.239910] RAX: ffffffffffffffda RBX: 000000000000003e RCX: 0000000000457421 [ 379.247232] RDX: 0000000000000001 RSI: 00007f379691ebf0 RDI: 00000000000000f0 [ 379.254553] RBP: 0000000020000500 R08: 00000000000000f0 R09: 0000000000000000 [ 379.261885] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f379691f6d4 [ 379.269228] R13: 00000000004c4b01 R14: 00000000004d8098 R15: 0000000000000004 [ 380.752119] misc userio: Buffer overflowed, userio client isn't keeping up [ 381.802222] ================================================================== [ 381.809636] BUG: KMSAN: uninit-value in synaptics_detect+0x207/0x2c0 [ 381.816148] CPU: 0 PID: 6322 Comm: kworker/0:4 Not tainted 4.19.0+ #76 [ 381.822802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.832163] Workqueue: events_long serio_handle_event [ 381.837351] Call Trace: [ 381.839936] dump_stack+0x306/0x460 [ 381.843562] ? synaptics_detect+0x207/0x2c0 [ 381.847894] kmsan_report+0x1a2/0x2e0 [ 381.851698] __msan_warning+0x7c/0xe0 [ 381.855502] synaptics_detect+0x207/0x2c0 [ 381.859658] psmouse_extensions+0x1110/0x3850 [ 381.864189] psmouse_switch_protocol+0x184/0xd90 [ 381.868979] psmouse_connect+0x13ce/0x2300 [ 381.873238] serio_driver_probe+0xe3/0x150 [ 381.877477] ? psmouse_interrupt+0x1950/0x1950 [ 381.882060] ? serio_uevent+0x6e0/0x6e0 [ 381.886033] really_probe+0x95f/0x13d0 [ 381.889934] driver_probe_device+0x1b4/0x4f0 [ 381.894362] __device_attach_driver+0x632/0x750 [ 381.899042] bus_for_each_drv+0x28e/0x3b0 [ 381.903192] ? driver_deferred_probe_add_trigger+0x3c0/0x3c0 [ 381.909002] __device_attach+0x447/0x6e0 [ 381.913075] device_initial_probe+0x4a/0x60 [ 381.917397] bus_probe_device+0x137/0x390 [ 381.921556] device_add+0x2715/0x2d20 [ 381.925385] serio_handle_event+0x1d90/0x2700 [ 381.929906] ? serio_resume+0x2b0/0x2b0 [ 381.933886] process_one_work+0x19a1/0x24d0 [ 381.938248] worker_thread+0x206d/0x2b30 [ 381.942335] kthread+0x59c/0x5d0 [ 381.945700] ? process_one_work+0x24d0/0x24d0 [ 381.950201] ? INIT_BOOL+0x30/0x30 [ 381.953745] ret_from_fork+0x35/0x40 [ 381.957459] [ 381.959083] Local variable description: ----param@synaptics_detect [ 381.965384] Variable was created at: [ 381.969098] synaptics_detect+0x5d/0x2c0 [ 381.973152] psmouse_extensions+0x1110/0x3850 [ 381.977650] ================================================================== [ 381.984997] Disabling lock debugging due to kernel taint [ 381.990437] Kernel panic - not syncing: panic_on_warn set ... [ 381.990437] [ 381.997806] CPU: 0 PID: 6322 Comm: kworker/0:4 Tainted: G B 4.19.0+ #76 [ 382.005854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.015211] Workqueue: events_long serio_handle_event [ 382.020410] Call Trace: [ 382.023006] dump_stack+0x306/0x460 [ 382.026662] panic+0x54c/0xafa [ 382.029884] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 382.035355] kmsan_report+0x2d3/0x2e0 [ 382.039159] __msan_warning+0x7c/0xe0 [ 382.042969] synaptics_detect+0x207/0x2c0 [ 382.047123] psmouse_extensions+0x1110/0x3850 [ 382.051624] psmouse_switch_protocol+0x184/0xd90 [ 382.056406] psmouse_connect+0x13ce/0x2300 [ 382.060659] serio_driver_probe+0xe3/0x150 [ 382.064890] ? psmouse_interrupt+0x1950/0x1950 [ 382.069472] ? serio_uevent+0x6e0/0x6e0 [ 382.073447] really_probe+0x95f/0x13d0 [ 382.077350] driver_probe_device+0x1b4/0x4f0 [ 382.081781] __device_attach_driver+0x632/0x750 [ 382.086478] bus_for_each_drv+0x28e/0x3b0 [ 382.090622] ? driver_deferred_probe_add_trigger+0x3c0/0x3c0 [ 382.096424] __device_attach+0x447/0x6e0 [ 382.100498] device_initial_probe+0x4a/0x60 [ 382.104822] bus_probe_device+0x137/0x390 [ 382.108977] device_add+0x2715/0x2d20 [ 382.112811] serio_handle_event+0x1d90/0x2700 [ 382.117320] ? serio_resume+0x2b0/0x2b0 [ 382.121294] process_one_work+0x19a1/0x24d0 [ 382.125634] worker_thread+0x206d/0x2b30 [ 382.129715] kthread+0x59c/0x5d0 [ 382.133076] ? process_one_work+0x24d0/0x24d0 [ 382.137576] ? INIT_BOOL+0x30/0x30 [ 382.141114] ret_from_fork+0x35/0x40 [ 382.145874] Kernel Offset: disabled [ 382.149518] Rebooting in 86400 seconds..