c0)={0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup2(r2, r3) fcntl$dupfd(r4, 0x0, r1) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) pipe(&(0x7f0000000040)) socket(0x10, 0x803, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'bridge_slave_1\x00', &(0x7f0000000280)=ANY=[@ANYRES32=r6]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000000)={'syz_tun\x00', 0x0}) 23:25:55 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c", 0x3e}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 23:25:55 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:25:56 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:25:56 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c", 0x3e}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 23:25:56 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:25:56 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x23, 0x20, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3c) 23:25:56 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000000)=""/113) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) close(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, r1, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000801}, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) 23:25:56 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:25:56 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) readv(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x1000000000000012}, &(0x7f00000002c0)) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x15) 23:25:56 executing program 3: pipe(&(0x7f0000000080)) socket$inet_udp(0x2, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{0xffffffffffffffff, 0x80}, {}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:25:56 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r1, r0, 0x0, 0x1ff) 23:25:56 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) [ 604.450305][T18538] ptrace attach of "/root/syz-executor.2"[18537] was attempted by "/root/syz-executor.2"[18538] 23:25:56 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:25:57 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r1, r0, 0x0, 0x1ff) 23:25:57 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:25:57 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:25:57 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:25:57 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r1, r0, 0x0, 0x1ff) 23:25:57 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000000)=""/113) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) close(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, r1, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000801}, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) 23:25:57 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:25:57 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:25:57 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000000)=""/113) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) close(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, r1, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000801}, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) 23:25:57 executing program 3: pipe(&(0x7f0000000080)) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:25:57 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r1, r0, 0x0, 0x1ff) 23:25:58 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:25:58 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:25:58 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(0xffffffffffffffff, r0, 0x0, 0x1ff) 23:25:58 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:25:58 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:25:58 executing program 3: pipe(&(0x7f0000000080)) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:25:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r2, 0x0) setreuid(0x0, 0x0) 23:25:59 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(0xffffffffffffffff, r0, 0x0, 0x1ff) 23:25:59 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:25:59 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00\x00\x00\x00\x00\b\x00', 0x10) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0801050704010000f9000000010000008a0200000500000000000000000000002c85f17f13e230293c"], 0x29) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 23:25:59 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:25:59 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(0xffffffffffffffff, r0, 0x0, 0x1ff) 23:25:59 executing program 1: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000240)}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0, 0x127}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:25:59 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00\x00\x00\x00\x00\b\x00', 0x10) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0801050704010000f9000000010000008a0200000500000000000000000000002c85f17f13e230293c"], 0x29) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 23:25:59 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) [ 607.164370][T18662] ptrace attach of "/root/syz-executor.1"[18661] was attempted by "/root/syz-executor.1"[18662] 23:25:59 executing program 1: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000240)}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0, 0x127}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:25:59 executing program 2: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) creat(&(0x7f0000000700)='./bus\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) creat(&(0x7f0000000700)='./bus\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup2(r2, r3) fcntl$dupfd(r4, 0x0, r1) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) pipe(&(0x7f0000000040)) socket(0x10, 0x803, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'bridge_slave_1\x00', &(0x7f0000000280)=ANY=[@ANYRES32=r6]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000000)={'syz_tun\x00', 0x0}) 23:25:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:25:59 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1ff) 23:25:59 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') r1 = socket$inet6(0xa, 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100001) 23:26:00 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:00 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:00 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r2, 0x208200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = open(&(0x7f0000000140)='./bus\x00', 0x8000000141142, 0x0) write$evdev(r6, &(0x7f0000000240)=[{{0x77359400}}], 0x389) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xd512, 0xe0b7}) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000200)={0x0, r8, 0x7}) 23:26:00 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1ff) 23:26:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') r1 = socket$inet6(0xa, 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100001) 23:26:00 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1ff) 23:26:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 23:26:00 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x123, 0x20, 0x2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000014c0)={r0, &(0x7f0000000400), &(0x7f0000000280)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)=""/155}, 0x20) 23:26:00 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) [ 608.006908][T18711] input: syz1 as /devices/virtual/input/input13 [ 608.205404][T18717] input: syz1 as /devices/virtual/input/input14 23:26:00 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r1, r0, 0x0, 0x1ff) 23:26:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r0, 0x10e, 0x6, 0x0, 0x0) 23:26:01 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:01 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x123, 0x24, 0x2, 0x141}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000014c0)={r0, &(0x7f0000000400), &(0x7f0000000280)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000140)}, 0x10) 23:26:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a00000000000004ff7f0000000000000200000100000000000100000000000002000100010000000000000200fd000005000500000000000a000072bbb6896209000055338b2698ffffffff7710aa00ffe8001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 23:26:01 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r1, r0, 0x0, 0x1ff) 23:26:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x80000, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x8000}, 0x3, 0x0, 0x5, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000040)=[',\x00'], 0x2}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x8, 0x50000) setreuid(0x0, r3) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x2530, 0x9}, {0x8, 0x3}], r3}, 0x18, 0x2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9], [0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x8], [0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x10) r5 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000440)={'vcan0\x00'}) bind$isdn_base(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0xda, 0x4, 0x0, 0x6}, 0xffffff8c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) 23:26:01 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r1, r0, 0x0, 0x1ff) 23:26:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a00000000000004ff7f0000000000000200000100000000000100000000000002000100010000000000000200fd000005000500000000000a000072bbb6896209000055338b2698ffffffff7710aa00ffe8001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 23:26:01 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:01 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:01 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r1, r0, 0x0, 0x1ff) 23:26:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) [ 609.313159][T18775] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 609.323189][T18775] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 609.333315][T18775] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 609.372440][T18775] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated [ 609.385143][T18775] EXT4-fs (loop0): get root inode failed [ 609.390894][T18775] EXT4-fs (loop0): mount failed 23:26:01 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x80000, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x8000}, 0x3, 0x0, 0x5, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000040)=[',\x00'], 0x2}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x8, 0x50000) setreuid(0x0, r3) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x2530, 0x9}, {0x8, 0x3}], r3}, 0x18, 0x2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9], [0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x8], [0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x10) r5 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000440)={'vcan0\x00'}) bind$isdn_base(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0xda, 0x4, 0x0, 0x6}, 0xffffff8c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) 23:26:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = memfd_create(0x0, 0x0) sendfile(r1, r0, 0x0, 0x1ff) 23:26:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = memfd_create(0x0, 0x0) sendfile(r1, r0, 0x0, 0x1ff) 23:26:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = memfd_create(0x0, 0x0) sendfile(r1, r0, 0x0, 0x1ff) 23:26:02 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:02 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:02 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x1ff) 23:26:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:02 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) [ 610.281465][T18820] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 610.291347][T18820] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 610.301294][T18820] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 610.358388][T18820] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated [ 610.370866][T18820] EXT4-fs (loop0): get root inode failed [ 610.376571][T18820] EXT4-fs (loop0): mount failed 23:26:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x1ff) 23:26:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:03 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r2, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:03 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r5, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000280)=""/4096) [ 611.070539][T18860] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 611.080353][T18860] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 611.090148][T18860] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 611.110411][T18860] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated [ 611.122975][T18860] EXT4-fs (loop0): get root inode failed [ 611.128734][T18860] EXT4-fs (loop0): mount failed 23:26:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x1ff) 23:26:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:03 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r2, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:03 executing program 5: syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r0 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1ff) 23:26:03 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r2, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:04 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r2, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:04 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r5, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r0 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1ff) 23:26:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:04 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r2, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:04 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r5, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:04 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r2, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r0 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1ff) 23:26:04 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:05 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r2, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r1, r0, 0x0, 0x0) 23:26:05 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:05 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:05 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r1, r0, 0x0, 0x0) 23:26:05 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:05 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r2, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:05 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r2, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) [ 613.779067][T18978] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 613.788984][T18978] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 613.799185][T18978] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 613.812803][T18978] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated [ 613.825352][T18978] EXT4-fs (loop0): get root inode failed [ 613.831077][T18978] EXT4-fs (loop0): mount failed 23:26:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) sendfile(r1, r0, 0x0, 0x0) 23:26:06 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:06 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r0, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:06 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:06 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) accept(r0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r1) accept(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x80000, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x8000}, 0x3, 0x0, 0x5, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000040)=[',\x00'], 0x2}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x8, 0x50000) setreuid(0x0, r3) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x2530, 0x9}, {0x8, 0x3}], r3}, 0x18, 0x2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9], [0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x8], [0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x10) r5 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000440)={'vcan0\x00'}) bind$isdn_base(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0xda, 0x4, 0x0, 0x6}, 0xffffff8c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) 23:26:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:06 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r0, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:06 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) accept(r0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r1) accept(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:06 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:07 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r0, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:07 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) accept(r0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r1) accept(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:07 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x80000, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x8000}, 0x3, 0x0, 0x5, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000040)=[',\x00'], 0x2}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x8, 0x50000) setreuid(0x0, r3) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x2530, 0x9}, {0x8, 0x3}], r3}, 0x18, 0x2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9], [0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x8], [0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x10) r5 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000440)={'vcan0\x00'}) bind$isdn_base(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0xda, 0x4, 0x0, 0x6}, 0xffffff8c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) 23:26:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:07 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(0x0, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:07 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:08 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(0x0, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:08 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x80000, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x8000}, 0x3, 0x0, 0x5, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000040)=[',\x00'], 0x2}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x8, 0x50000) setreuid(0x0, r3) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x2530, 0x9}, {0x8, 0x3}], r3}, 0x18, 0x2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9], [0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x8], [0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x10) r5 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000440)={'vcan0\x00'}) bind$isdn_base(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0xda, 0x4, 0x0, 0x6}, 0xffffff8c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) 23:26:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) [ 616.298720][T19089] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 616.308604][T19089] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 616.318499][T19089] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock 23:26:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) [ 616.337819][T19089] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated [ 616.354947][T19089] EXT4-fs (loop0): get root inode failed [ 616.360703][T19089] EXT4-fs (loop0): mount failed 23:26:08 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(0x0, r4, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:09 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) gettid() rt_tgsigqueueinfo(r2, 0x0, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000140)={0xc0e1, 0x1, 0x7fffffff, 0x80}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x8000}, 0x3, 0x0, 0x5, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000040)=[',\x00'], 0x2}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x8, 0x50000) setreuid(0x0, r5) fsetxattr$security_capability(r3, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x2530, 0x9}, {0x0, 0x3}]}, 0x18, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8], [0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x10) r7 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000440)={'vcan0\x00'}) bind$isdn_base(r7, &(0x7f00000000c0)={0x22, 0xda, 0x0, 0x2, 0x6}, 0xffffff8c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 23:26:09 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) 23:26:09 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) gettid() rt_tgsigqueueinfo(r2, 0x0, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:09 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) gettid() rt_tgsigqueueinfo(r2, 0x0, 0x1c, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 617.330173][T19130] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 617.340250][T19130] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 617.350387][T19130] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 617.376977][T19130] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated [ 617.389629][T19130] EXT4-fs (loop0): get root inode failed [ 617.395376][T19130] EXT4-fs (loop0): mount failed 23:26:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 23:26:10 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x0, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000140)={0xc0e1, 0x1, 0x7fffffff, 0x80}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x8000}, 0x3, 0x0, 0x5, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000040)=[',\x00'], 0x2}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x8, 0x50000) setreuid(0x0, r5) fsetxattr$security_capability(r3, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x2530, 0x9}, {0x0, 0x3}]}, 0x18, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8], [0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x10) r7 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000440)={'vcan0\x00'}) bind$isdn_base(r7, &(0x7f00000000c0)={0x22, 0xda, 0x0, 0x2, 0x6}, 0xffffff8c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 23:26:10 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r3 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 23:26:10 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x0, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:10 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x0, &(0x7f0000000100)) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) [ 618.309562][T19171] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 618.319386][T19171] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 618.329166][T19171] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 618.350284][T19171] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated [ 618.362614][T19171] EXT4-fs (loop0): get root inode failed [ 618.368378][T19171] EXT4-fs (loop0): mount failed 23:26:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a00000000000004ff7f0000000000000200000100000000000100000000000002000100010000000000000200fd000005000500000000000a000072bbb6896209000055338b2698ffffffff7710aa00ffe8001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 23:26:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 23:26:11 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, 0x0) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:11 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, 0x0) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 23:26:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a00000000000004ff7f0000000000000200000100000000000100000000000002000100010000000000000200fd000005000500000000000a000072bbb6896209000055338b2698ffffffff7710aa00ffe8001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 23:26:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:11 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r3 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a", 0x8) 23:26:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 23:26:11 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, 0x0) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:26:11 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r3 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a", 0x8) 23:26:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:12 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r1, r4, 0x1c, &(0x7f0000000100)) read(0xffffffffffffffff, &(0x7f0000000700)=""/128, 0xfc25) 23:26:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a", 0x8) 23:26:12 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x4, 0x4, 0x42}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:26:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:12 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r1, r4, 0x1c, &(0x7f0000000100)) read(0xffffffffffffffff, &(0x7f0000000700)=""/128, 0xfc25) 23:26:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000000240)=[{0x45, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 23:26:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58", 0xc) [ 620.309678][T19273] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 620.319501][T19273] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 620.329269][T19273] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 620.348760][T19273] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated [ 620.364797][T19273] EXT4-fs (loop0): get root inode failed [ 620.370497][T19273] EXT4-fs (loop0): mount failed 23:26:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58", 0xc) 23:26:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1ec, 0x0) recvfrom$x25(r1, 0x0, 0x0, 0x0, 0x0, 0x4000) 23:26:13 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_tgsigqueueinfo(r1, r4, 0x1c, &(0x7f0000000100)) read(0xffffffffffffffff, &(0x7f0000000700)=""/128, 0xfc25) 23:26:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58", 0xc) 23:26:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:13 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a", 0x8) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356e", 0xe) 23:26:13 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, 0x0, 0x0) 23:26:13 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x80}, {r1}], 0x2, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0xfffffffffffffd57, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast1, @in6=@local}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) writev(r0, &(0x7f0000000480)=[{&(0x7f00000005c0)="d733d54f65b4edd0398a390a9ca8ca04d80f70d67e43b1dbdd692be1a51b5e2d2bc09b775ec168c0728412f2e00392117c9e7bfdadee2aee7b32951bf2bd764d70e91c", 0x43}, {&(0x7f0000000280)}, {0x0}], 0x3) socket$inet_smc(0x2b, 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESHEX, @ANYBLOB], 0x3d) setsockopt$sock_void(r0, 0x1, 0x3b, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) [ 621.313866][T19318] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 621.323712][T19318] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 621.333633][T19318] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 621.349141][T19318] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated 23:26:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356e", 0xe) [ 621.365819][T19318] EXT4-fs (loop0): get root inode failed [ 621.371735][T19318] EXT4-fs (loop0): mount failed 23:26:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a", 0x8) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:14 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, 0x0, 0x0) 23:26:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356e", 0xe) 23:26:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a", 0x8) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:14 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2", 0xf) 23:26:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58", 0xc) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:14 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1c, &(0x7f0000000100)) read(r1, 0x0, 0x0) 23:26:14 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x80}, {r1}], 0x2, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0xfffffffffffffd57, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast1, @in6=@local}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) writev(r0, &(0x7f0000000480)=[{&(0x7f00000005c0)="d733d54f65b4edd0398a390a9ca8ca04d80f70d67e43b1dbdd692be1a51b5e2d2bc09b775ec168c0728412f2e00392117c9e7bfdadee2aee7b32951bf2bd764d70e91c", 0x43}, {&(0x7f0000000280)}, {0x0}], 0x3) socket$inet_smc(0x2b, 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESHEX, @ANYBLOB], 0x3d) setsockopt$sock_void(r0, 0x1, 0x3b, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) 23:26:14 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2", 0xf) 23:26:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000004c0)=""/211, 0xd8}}, {{&(0x7f0000000640)=@alg, 0x80, &(0x7f0000000b80), 0x5, 0x0, 0x37b}}, {{&(0x7f0000000c00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000056c0)=""/4096}, {&(0x7f0000000180)=""/244}], 0x2000000000000052, &(0x7f0000003340)=""/4096, 0x1000}}, {{0x0, 0x146, &(0x7f0000000e80)=[{&(0x7f0000001340)=""/4106, 0x1000}], 0x1, &(0x7f00000055c0)=""/74, 0xffffffffffffff92}}, {{&(0x7f0000000f00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000001140), 0x2, &(0x7f0000001180)=""/109, 0x1e0}}, {{&(0x7f0000001200)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/8}, {&(0x7f0000000300)=""/57}, {&(0x7f00000003c0)=""/204}, {&(0x7f00000006c0)=""/76}, {&(0x7f0000007200)=""/4096}, {&(0x7f00000005c0)=""/21}, {&(0x7f0000000740)=""/74}, {&(0x7f00000007c0)=""/48}], 0x200000000000017e, &(0x7f0000006900)=""/121, 0x79}}, {{&(0x7f0000000340)=@generic, 0x4, &(0x7f0000006ec0)=[{&(0x7f0000006a00)=""/57, 0x2fb}, {&(0x7f0000006a40)=""/154, 0x9d}, {&(0x7f0000006b00)=""/209, 0xd1}, {&(0x7f0000006c00)=""/210, 0xd2}, {&(0x7f0000006d00)=""/3, 0x3}, {&(0x7f0000006d40)=""/30, 0x1e}, {&(0x7f0000000bc0)=""/2, 0x2}, {&(0x7f0000006dc0)=""/173, 0xad}, {&(0x7f0000006e80)=""/56, 0x38}], 0x9, &(0x7f0000005640)=""/92, 0x5c}}], 0x800000000000067, 0x0, &(0x7f00000071c0)={0x77359400}) sendto$inet(r0, &(0x7f00000012c0)='2', 0x1, 0x0, 0x0, 0x0) [ 622.717512][T19384] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 622.736783][T19384] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 622.747265][T19384] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 622.761698][T19384] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated [ 622.778202][T19384] EXT4-fs (loop0): get root inode failed [ 622.785272][T19384] EXT4-fs (loop0): mount failed 23:26:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58", 0xc) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2", 0xf) 23:26:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{}, {}, {}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 622.925293][T19394] IPVS: ftp: loaded support on port[0] = 21 23:26:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58", 0xc) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffe54, 0x0, 0x0, 0x9a) 23:26:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356e", 0xe) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:15 executing program 2: bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_evm(0x0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=ANY=[], 0x0, 0x0) fsync(0xffffffffffffffff) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00[\xaaZ\xaf\xc0\x8c\xaa\xaf\xc1DP\xf0_\'\xaf\xeb\x19s\xf3\xafp\xcam\x14\x9cR\x8d\xefh\xbb\xca\xfc\xdeF4\xbbc\x93\xae\xbf\xe6\x7fJL]\xb7\xc0#;,F\xc2\xc8\x93<\x0f7\xe4\x01\xc0\xa6#\x82\x02\xcdT\x02l\x80\xff\xf8\xd8YQL\x06\xdexu!\xb32$\x04&e\\^\xe0nZ') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:26:15 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x80}, {r1}], 0x2, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0xfffffffffffffd57, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast1, @in6=@local}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) writev(r0, &(0x7f0000000480)=[{&(0x7f00000005c0)="d733d54f65b4edd0398a390a9ca8ca04d80f70d67e43b1dbdd692be1a51b5e2d2bc09b775ec168c0728412f2e00392117c9e7bfdadee2aee7b32951bf2bd764d70e91c", 0x43}, {&(0x7f0000000280)}, {0x0}], 0x3) socket$inet_smc(0x2b, 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESHEX, @ANYBLOB], 0x3d) setsockopt$sock_void(r0, 0x1, 0x3b, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) 23:26:15 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356e", 0xe) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356e", 0xe) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) [ 623.677694][T19394] IPVS: ftp: loaded support on port[0] = 21 23:26:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:16 executing program 2: bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_evm(0x0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=ANY=[], 0x0, 0x0) fsync(0xffffffffffffffff) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00[\xaaZ\xaf\xc0\x8c\xaa\xaf\xc1DP\xf0_\'\xaf\xeb\x19s\xf3\xafp\xcam\x14\x9cR\x8d\xefh\xbb\xca\xfc\xdeF4\xbbc\x93\xae\xbf\xe6\x7fJL]\xb7\xc0#;,F\xc2\xc8\x93<\x0f7\xe4\x01\xc0\xa6#\x82\x02\xcdT\x02l\x80\xff\xf8\xd8YQL\x06\xdexu!\xb32$\x04&e\\^\xe0nZ') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:26:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2", 0xf) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) [ 623.896301][T19433] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 623.981648][T19433] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 624.048626][T19433] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 624.086820][T19433] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated 23:26:16 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{}, {}, {}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 23:26:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2", 0xf) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:16 executing program 2: bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_evm(0x0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=ANY=[], 0x0, 0x0) fsync(0xffffffffffffffff) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00[\xaaZ\xaf\xc0\x8c\xaa\xaf\xc1DP\xf0_\'\xaf\xeb\x19s\xf3\xafp\xcam\x14\x9cR\x8d\xefh\xbb\xca\xfc\xdeF4\xbbc\x93\xae\xbf\xe6\x7fJL]\xb7\xc0#;,F\xc2\xc8\x93<\x0f7\xe4\x01\xc0\xa6#\x82\x02\xcdT\x02l\x80\xff\xf8\xd8YQL\x06\xdexu!\xb32$\x04&e\\^\xe0nZ') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 624.214745][T19433] EXT4-fs (loop0): get root inode failed [ 624.245697][T19455] IPVS: ftp: loaded support on port[0] = 21 [ 624.262088][T19433] EXT4-fs (loop0): mount failed 23:26:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2", 0xf) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000100)='9', 0x1}], 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000040)=0x8, &(0x7f0000000140)=0x2) 23:26:16 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:17 executing program 2: pipe(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0xfffffffffffffd57, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x40000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:26:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) [ 625.096657][T19479] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 23:26:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, 0x0, 0x0, 0x0) [ 625.157910][T19479] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 625.241145][T19479] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 625.290971][T19479] EXT4-fs error (device loop0): ext4_fill_super:4489: inode #2: comm syz-executor.0: iget: root inode unallocated [ 625.385469][T19479] EXT4-fs (loop0): get root inode failed [ 625.415706][T19479] EXT4-fs (loop0): mount failed 23:26:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000040)=0x8, &(0x7f0000000140)=0x2) 23:26:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 23:26:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:18 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:18 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) fcntl$notify(r0, 0x402, 0x10) 23:26:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 23:26:18 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:18 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) fcntl$notify(r0, 0x402, 0x10) 23:26:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380), 0x0, 0x0) 23:26:18 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:18 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) fcntl$notify(r0, 0x402, 0x10) 23:26:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000040)=0x8, &(0x7f0000000140)=0x2) 23:26:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380), 0x0, 0x0) 23:26:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:19 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653", 0x38}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 23:26:19 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380), 0x0, 0x0) 23:26:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:20 executing program 2: clone(0x47fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = gettid() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r0) tkill(r0, 0x9) waitid(0x0, 0x0, 0x0, 0x20000002, 0x0) 23:26:20 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 23:26:20 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000180), 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x46e62b7f, &(0x7f0000000100)={0x0}) [ 627.819018][T19569] cgroup: fork rejected by pids controller in /syz0 23:26:20 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:20 executing program 2: clone(0x47fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = gettid() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r0) tkill(r0, 0x9) waitid(0x0, 0x0, 0x0, 0x20000002, 0x0) [ 627.954734][T19689] ptrace attach of "/root/syz-executor.2"[19687] was attempted by "/root/syz-executor.2"[19689] 23:26:20 executing program 4: open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000000000}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x202002) keyctl$chown(0x4, r2, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x69}}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00') clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000740), &(0x7f0000000b80)) perf_event_open(&(0x7f0000000440)={0x3, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x7, 0xfff}, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cgroup.controllers\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x110002, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000240)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='`\"\x93\x88(\xc5n\x00\x1a\x00'}) stat(&(0x7f00000007c0)='./file1\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000780)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x8}, {0xfffffffffffffff7, 0x54}], r4}, 0x18, 0x2) ioctl$sock_ifreq(0xffffffffffffffff, 0x8994, &(0x7f0000000040)={'bond0\x00\xe1\x00\nL!!\x00\x01\x00', @ifru_settings={0xffffffff, 0x5, @raw_hdlc=&(0x7f0000000000)={0x0, 0x4}}}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40400) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0xfffffffffffffd7f, 0x0, 0x5}, 0x2) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="a1deb09fb229f3e327206d312b9d2546ceb8e2851ac20115cf87f51f3bceaf704bfaf2847ce9b975dd9a72c93ed3608d5f3634b81ebcdb1b0c218171c1ca41cb4eb76df433e3c78e7c3e476f2d5117e90b5854cd0dbc44ac612e54b997f643e61d47a59cc0943702650117c34b47a5a20dea48101102dba38c08dbaf98f16cc56d241d8d8a91caebb1710ec44ced951875b10f9585db7b9bd907", 0x9a, 0xfffffffffffffffb) 23:26:20 executing program 2: clone(0x47fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = gettid() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r0) tkill(r0, 0x9) waitid(0x0, 0x0, 0x0, 0x20000002, 0x0) [ 628.502971][T19711] IPVS: ftp: loaded support on port[0] = 21 23:26:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:21 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:21 executing program 2: 23:26:21 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0'}, 0x4) 23:26:21 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x8004, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) socket$inet6(0xa, 0x0, 0x0) 23:26:21 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:21 executing program 1: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @remote}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0x5c, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @loopback, {[@rr={0x7, 0x17, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @rand_addr, @multicast1, @multicast1]}, @timestamp={0x44, 0x1c, 0x0, 0x0, 0x0, [{}, {[@initdev={0xac, 0x1e, 0x0, 0x0}]}, {}, {[@initdev={0xac, 0x1e, 0x0, 0x0}]}]}, @lsrr={0x83, 0x7, 0x0, [@broadcast]}, @ssrr={0x89, 0x3}]}}}}}}}, 0x0) [ 629.251495][T19718] IPVS: ftp: loaded support on port[0] = 21 23:26:21 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x4e21, @remote}}}, 0x84) 23:26:21 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:22 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/165, 0xa5}], 0x1) ioctl$TIOCGPTPEER(r1, 0x5441, 0x5) r2 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000000)={0x6, {{0x2, 0x4e21, @remote}}}, 0x84) 23:26:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:22 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x4e21, @remote}}}, 0x84) 23:26:22 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x4e21, @remote}}}, 0x84) 23:26:22 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:22 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/165, 0xa5}], 0x1) ioctl$TIOCGPTPEER(r1, 0x5441, 0x5) r2 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000000)={0x6, {{0x2, 0x4e21, @remote}}}, 0x84) 23:26:22 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:22 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/165, 0xa5}], 0x1) ioctl$TIOCGPTPEER(r1, 0x5441, 0x5) r2 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000000)={0x6, {{0x2, 0x4e21, @remote}}}, 0x84) 23:26:22 executing program 2: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/165, 0xa5}], 0x1) ioctl$TIOCGPTPEER(r1, 0x5441, 0x5) r2 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000000)={0x6, {{0x2, 0x4e21, @remote}}}, 0x84) 23:26:23 executing program 1: 23:26:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:23 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:23 executing program 1: 23:26:23 executing program 4: 23:26:23 executing program 1: 23:26:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:23 executing program 2: 23:26:23 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:24 executing program 4: 23:26:24 executing program 2: 23:26:24 executing program 1: 23:26:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:24 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:24 executing program 4: 23:26:24 executing program 2: 23:26:24 executing program 1: 23:26:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:24 executing program 4: 23:26:24 executing program 2: 23:26:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:24 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:24 executing program 1: 23:26:24 executing program 4: 23:26:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:25 executing program 2: 23:26:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:25 executing program 1: 23:26:25 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:25 executing program 4: 23:26:25 executing program 1: 23:26:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:25 executing program 4: 23:26:25 executing program 2: 23:26:25 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r1) accept(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:25 executing program 1: 23:26:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:26 executing program 4: 23:26:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:26 executing program 2: 23:26:26 executing program 1: 23:26:26 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r1) accept(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:26 executing program 2: 23:26:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:26 executing program 4: 23:26:26 executing program 1: 23:26:26 executing program 2: 23:26:26 executing program 4: 23:26:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:27 executing program 1: 23:26:27 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r1) accept(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:27 executing program 4: 23:26:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:27 executing program 2: 23:26:27 executing program 2: 23:26:27 executing program 4: 23:26:27 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r0, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:27 executing program 1: 23:26:27 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:27 executing program 2: 23:26:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:28 executing program 4: 23:26:28 executing program 1: 23:26:28 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r0, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:28 executing program 2: 23:26:28 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:28 executing program 1: 23:26:28 executing program 4: 23:26:28 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r0, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:28 executing program 2: 23:26:28 executing program 1: 23:26:28 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:29 executing program 4: 23:26:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:29 executing program 2: 23:26:29 executing program 1: 23:26:29 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:29 executing program 1: 23:26:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:29 executing program 4: 23:26:29 executing program 2: 23:26:29 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:29 executing program 1: 23:26:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:30 executing program 4: 23:26:30 executing program 2: 23:26:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:30 executing program 1: 23:26:30 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:30 executing program 4: 23:26:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:30 executing program 2: 23:26:30 executing program 1: 23:26:30 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(0xffffffffffffffff) r0 = accept(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r1) accept(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:30 executing program 2: 23:26:30 executing program 1: 23:26:30 executing program 4: 23:26:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:30 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(0xffffffffffffffff) r0 = accept(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r1) accept(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:31 executing program 4: 23:26:31 executing program 1: 23:26:31 executing program 2: 23:26:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:31 executing program 2: 23:26:31 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(0xffffffffffffffff) r0 = accept(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r1) accept(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:31 executing program 4: 23:26:31 executing program 1: 23:26:31 executing program 2: 23:26:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:31 executing program 0: r0 = creat(0x0, 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:31 executing program 2: 23:26:31 executing program 1: 23:26:32 executing program 4: 23:26:32 executing program 0: r0 = creat(0x0, 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:32 executing program 2: 23:26:32 executing program 4: 23:26:32 executing program 1: 23:26:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:32 executing program 0: r0 = creat(0x0, 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:32 executing program 4: 23:26:32 executing program 2: 23:26:32 executing program 1: 23:26:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:33 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:33 executing program 4: 23:26:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:33 executing program 2: 23:26:33 executing program 1: 23:26:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:33 executing program 4: 23:26:33 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:33 executing program 1: 23:26:33 executing program 4: 23:26:33 executing program 2: 23:26:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:34 executing program 1: 23:26:34 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:34 executing program 2: 23:26:34 executing program 4: 23:26:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:34 executing program 1: 23:26:34 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:34 executing program 4: 23:26:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:34 executing program 2: 23:26:34 executing program 1: 23:26:35 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:35 executing program 4: 23:26:35 executing program 2: 23:26:35 executing program 1: 23:26:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:35 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:35 executing program 4: 23:26:35 executing program 2: 23:26:35 executing program 1: 23:26:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a", 0x8) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:36 executing program 4: 23:26:36 executing program 1: 23:26:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}], 0x1, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:36 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, 0x0, 0x0) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:36 executing program 2: 23:26:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a", 0x8) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:36 executing program 4: 23:26:36 executing program 1: 23:26:36 executing program 2: 23:26:36 executing program 4: 23:26:36 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x2, 0x73) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000000)=r1, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "34b0d00b45eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) 23:26:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a", 0x8) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:36 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, 0x0, 0x0) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:36 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000002e008100a00f80ecdb4cb9040a4865160b000200d4", 0x19}], 0x1}, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) 23:26:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58", 0xc) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:37 executing program 4: mount(0x0, 0x0, 0x0, 0xc0ed0000, 0x0) 23:26:37 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x23, 0x20, 0x2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 23:26:37 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, 0x0, 0x0) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:37 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x23, 0x20, 0x2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000014c0)={r0, &(0x7f0000000400), &(0x7f0000000280)}, 0x20) 23:26:37 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x23, 0x20, 0x2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000014c0)={r0, &(0x7f0000000400), &(0x7f0000000280)}, 0x20) 23:26:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:26:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58", 0xc) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:37 executing program 4: socket$netlink(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pipe2(&(0x7f0000000140), 0x0) pause() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="04520f0505c8f1e6f30f3471"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) tkill(r0, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:26:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x80000000000003}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 23:26:37 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) [ 645.513514][T20587] ptrace attach of "/root/syz-executor.4"[20586] was attempted by "/root/syz-executor.4"[20587] 23:26:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58", 0xc) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:38 executing program 4: socket$netlink(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pipe2(&(0x7f0000000140), 0x0) pipe(&(0x7f0000000040)) pause() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="04720f0505c8f1e6f30f3471"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) tkill(r0, 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:26:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:26:38 executing program 1: socket$netlink(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) pause() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="04520f0505c8"], 0x6}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x18, 0x0, r1}) tkill(r0, 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:26:38 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:38 executing program 4: socket$netlink(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pipe2(&(0x7f0000000140), 0x0) pipe(&(0x7f0000000040)) pause() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="04520f05"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) tkill(r0, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:26:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356e", 0xe) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) [ 646.083416][T20614] ptrace attach of "/root/syz-executor.4"[20613] was attempted by "/root/syz-executor.4"[20614] [ 646.110100][T20618] ptrace attach of "/root/syz-executor.4"[20617] was attempted by "/root/syz-executor.4"[20618] 23:26:38 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356e", 0xe) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356e", 0xe) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2", 0xf) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:39 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, 'security.evm\x00'}]}, 0x19) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2", 0xf) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:26:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2", 0xf) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:39 executing program 4: socket$netlink(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pipe2(&(0x7f0000000140), 0x0) pipe(&(0x7f0000000040)) pause() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="04520f05"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) tkill(r0, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:26:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000700)="8c2fb074d782b99a4ebb28bd49ca9d8f70aca1f2e24e7dc4636db1607852800ad7239bfbb123065f680fcd8bd0da6e13b662424ccd67943bc81a1d56defee801abbb295542689614ad3cf075062ecc8f45aa7708f05b4a75cd21c51a0cdf5c1d22ec6c88b2f328c35d2284ce37375165fc7b892d92b8d60d65de6a11b376b8379dea0e24d9d54997f9b0c35fdbb691b6a85b1dd235877eaf2c6b56cdebc12feefd6c32891969cc07ec80aa29bcc95a7fa0866e97a784c0ac21edab15d06cfb51b0f47e5f4404000000", 0xc9}], 0x1}}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") recvmmsg(r0, &(0x7f0000006840)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/62, 0x3e}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/38, 0x26}, {&(0x7f0000000a80)=""/108, 0x6c}], 0x2}}], 0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x1c) 23:26:39 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, 'security.evm\x00'}]}, 0x19) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) [ 647.318684][T20791] ptrace attach of "/root/syz-executor.4"[20790] was attempted by "/root/syz-executor.4"[20791] 23:26:39 executing program 4: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 23:26:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:26:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{0xffffffffffffffff, 0x80}], 0x1, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:40 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, 'security.evm\x00'}]}, 0x19) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x200000ba}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:26:40 executing program 1: syz_emit_ethernet(0x7e, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @remote}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0x5c, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @local, {[@rr={0x7, 0x17, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @rand_addr, @multicast1, @multicast1]}, @timestamp={0x44, 0x18, 0x0, 0x0, 0x0, [{}, {}, {}, {[@initdev={0xac, 0x1e, 0x0, 0x0}]}]}, @lsrr={0x83, 0x7, 0x0, [@broadcast]}, @ssrr={0x89, 0x7, 0x0, [@rand_addr]}]}}}}}}}, 0x0) 23:26:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 23:26:40 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(0xffffffffffffffff) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:40 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000001c000000ed03000002000000010000000000000e02000000000000000000030000000004000000400000131f7c4e148c"], &(0x7f0000000280)=""/236, 0x3c, 0xec, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r5 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, 0x0}, 0x70) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00'}, 0x30) write$cgroup_int(r5, 0x0, 0x0) 23:26:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 23:26:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 648.617774][T20944] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 648.645317][T20944] CPU: 0 PID: 20944 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 648.653267][T20944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.663321][T20944] Call Trace: [ 648.666626][T20944] dump_stack+0xf5/0x159 [ 648.670971][T20944] dump_header+0xaa/0x449 [ 648.675329][T20944] oom_kill_process.cold+0x10/0x15 [ 648.680465][T20944] out_of_memory+0x231/0xa00 [ 648.685085][T20944] mem_cgroup_out_of_memory+0x128/0x150 [ 648.690648][T20944] memory_max_write+0x17b/0x250 [ 648.695508][T20944] cgroup_file_write+0x119/0x320 [ 648.700460][T20944] ? high_work_func+0x30/0x30 [ 648.705152][T20944] ? kernfs_get_active+0x9b/0xd0 [ 648.710109][T20944] kernfs_fop_write+0x1f4/0x2e0 [ 648.714974][T20944] ? cgroup_css.part.0+0x90/0x90 [ 648.719930][T20944] __vfs_write+0x67/0xc0 [ 648.724177][T20944] ? kernfs_seq_show+0xe0/0xe0 [ 648.728943][T20944] vfs_write+0x18a/0x390 [ 648.733200][T20944] ksys_write+0xd5/0x1b0 [ 648.737473][T20944] __x64_sys_write+0x4c/0x60 [ 648.742079][T20944] do_syscall_64+0xcc/0x370 [ 648.746597][T20944] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 648.752492][T20944] RIP: 0033:0x45a219 [ 648.756397][T20944] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 648.776267][T20944] RSP: 002b:00007feb5be7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 648.784685][T20944] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 648.792658][T20944] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 648.800627][T20944] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 648.808603][T20944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb5be7b6d4 [ 648.816583][T20944] R13: 00000000004cab4b R14: 00000000004e3000 R15: 00000000ffffffff [ 648.833523][T20944] memory: usage 10020kB, limit 0kB, failcnt 42 [ 648.846836][T20944] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 648.867504][T20944] Memory cgroup stats for /syz1: [ 648.867641][T20944] anon 9007104 [ 648.867641][T20944] file 118784 [ 648.867641][T20944] kernel_stack 73728 [ 648.867641][T20944] slab 585728 [ 648.867641][T20944] sock 0 [ 648.867641][T20944] shmem 81920 [ 648.867641][T20944] file_mapped 0 [ 648.867641][T20944] file_dirty 0 [ 648.867641][T20944] file_writeback 0 [ 648.867641][T20944] anon_thp 8388608 [ 648.867641][T20944] inactive_anon 0 [ 648.867641][T20944] active_anon 8916992 [ 648.867641][T20944] inactive_file 135168 [ 648.867641][T20944] active_file 0 [ 648.867641][T20944] unevictable 0 [ 648.867641][T20944] slab_reclaimable 135168 [ 648.867641][T20944] slab_unreclaimable 450560 [ 648.867641][T20944] pgfault 38478 [ 648.867641][T20944] pgmajfault 0 [ 648.867641][T20944] workingset_refault 0 [ 648.867641][T20944] workingset_activate 0 [ 648.867641][T20944] workingset_nodereclaim 0 [ 648.867641][T20944] pgrefill 33 [ 648.867641][T20944] pgscan 67 [ 648.867641][T20944] pgsteal 0 [ 648.867641][T20944] pgactivate 33 [ 648.963335][T20944] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18208,uid=0 [ 648.978817][T20944] Memory cgroup out of memory: Killed process 18208 (syz-executor.1) total-vm:72584kB, anon-rss:2196kB, file-rss:35812kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 648.997979][ T1062] oom_reaper: reaped process 18208 (syz-executor.1), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 649.000981][T20944] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 649.023671][T20944] CPU: 1 PID: 20944 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 649.031569][T20944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.041623][T20944] Call Trace: [ 649.044904][T20944] dump_stack+0xf5/0x159 [ 649.049137][T20944] dump_header+0xaa/0x449 [ 649.053458][T20944] oom_kill_process.cold+0x10/0x15 [ 649.058597][T20944] out_of_memory+0x231/0xa00 [ 649.063185][T20944] mem_cgroup_out_of_memory+0x128/0x150 [ 649.068731][T20944] memory_max_write+0x17b/0x250 [ 649.073625][T20944] cgroup_file_write+0x119/0x320 [ 649.078550][T20944] ? high_work_func+0x30/0x30 [ 649.083224][T20944] ? kernfs_get_active+0x9b/0xd0 [ 649.088147][T20944] kernfs_fop_write+0x1f4/0x2e0 [ 649.092981][T20944] ? cgroup_css.part.0+0x90/0x90 [ 649.097905][T20944] __vfs_write+0x67/0xc0 [ 649.102149][T20944] ? kernfs_seq_show+0xe0/0xe0 [ 649.106899][T20944] vfs_write+0x18a/0x390 [ 649.111125][T20944] ksys_write+0xd5/0x1b0 [ 649.115374][T20944] __x64_sys_write+0x4c/0x60 [ 649.119963][T20944] do_syscall_64+0xcc/0x370 [ 649.124457][T20944] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 649.130374][T20944] RIP: 0033:0x45a219 [ 649.134279][T20944] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.153883][T20944] RSP: 002b:00007feb5be7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 649.162283][T20944] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 649.170236][T20944] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 649.178192][T20944] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 649.186232][T20944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb5be7b6d4 [ 649.194189][T20944] R13: 00000000004cab4b R14: 00000000004e3000 R15: 00000000ffffffff [ 649.206059][T20944] memory: usage 7708kB, limit 0kB, failcnt 42 [ 649.212591][T20944] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 649.219453][T20944] Memory cgroup stats for /syz1: [ 649.219539][T20944] anon 6709248 [ 649.219539][T20944] file 118784 [ 649.219539][T20944] kernel_stack 73728 [ 649.219539][T20944] slab 585728 [ 649.219539][T20944] sock 0 [ 649.219539][T20944] shmem 81920 [ 649.219539][T20944] file_mapped 0 [ 649.219539][T20944] file_dirty 0 [ 649.219539][T20944] file_writeback 0 [ 649.219539][T20944] anon_thp 6291456 [ 649.219539][T20944] inactive_anon 0 [ 649.219539][T20944] active_anon 6709248 [ 649.219539][T20944] inactive_file 135168 [ 649.219539][T20944] active_file 0 [ 649.219539][T20944] unevictable 0 [ 649.219539][T20944] slab_reclaimable 135168 [ 649.219539][T20944] slab_unreclaimable 450560 [ 649.219539][T20944] pgfault 38478 [ 649.219539][T20944] pgmajfault 0 [ 649.219539][T20944] workingset_refault 0 [ 649.219539][T20944] workingset_activate 0 [ 649.219539][T20944] workingset_nodereclaim 0 [ 649.219539][T20944] pgrefill 33 [ 649.219539][T20944] pgscan 67 [ 649.219539][T20944] pgsteal 0 [ 649.219539][T20944] pgactivate 33 [ 649.314662][T20944] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=19727,uid=0 [ 649.330193][T20944] Memory cgroup out of memory: Killed process 19727 (syz-executor.1) total-vm:72848kB, anon-rss:2212kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 649.349489][ T1062] oom_reaper: reaped process 19727 (syz-executor.1), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 649.360736][T20944] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 649.370973][T20944] CPU: 0 PID: 20944 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 649.378855][T20944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.388905][T20944] Call Trace: [ 649.392198][T20944] dump_stack+0xf5/0x159 [ 649.396440][T20944] dump_header+0xaa/0x449 [ 649.400774][T20944] oom_kill_process.cold+0x10/0x15 [ 649.405886][T20944] out_of_memory+0x231/0xa00 [ 649.410481][T20944] mem_cgroup_out_of_memory+0x128/0x150 [ 649.416031][T20944] memory_max_write+0x17b/0x250 [ 649.420880][T20944] cgroup_file_write+0x119/0x320 [ 649.425818][T20944] ? high_work_func+0x30/0x30 [ 649.430489][T20944] ? kernfs_get_active+0x9b/0xd0 [ 649.435429][T20944] kernfs_fop_write+0x1f4/0x2e0 [ 649.440286][T20944] ? cgroup_css.part.0+0x90/0x90 [ 649.445220][T20944] __vfs_write+0x67/0xc0 [ 649.449457][T20944] ? kernfs_seq_show+0xe0/0xe0 [ 649.454216][T20944] vfs_write+0x18a/0x390 [ 649.458459][T20944] ksys_write+0xd5/0x1b0 [ 649.462701][T20944] __x64_sys_write+0x4c/0x60 [ 649.467306][T20944] do_syscall_64+0xcc/0x370 [ 649.471808][T20944] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 649.477687][T20944] RIP: 0033:0x45a219 [ 649.481582][T20944] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.501180][T20944] RSP: 002b:00007feb5be7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 649.509584][T20944] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 649.517547][T20944] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 649.525509][T20944] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 649.533482][T20944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb5be7b6d4 [ 649.541446][T20944] R13: 00000000004cab4b R14: 00000000004e3000 R15: 00000000ffffffff [ 649.550920][T20944] memory: usage 5504kB, limit 0kB, failcnt 50 [ 649.557013][T20944] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 649.564858][T20944] Memory cgroup stats for /syz1: [ 649.565068][T20944] anon 4534272 [ 649.565068][T20944] file 118784 [ 649.565068][T20944] kernel_stack 73728 [ 649.565068][T20944] slab 585728 [ 649.565068][T20944] sock 0 [ 649.565068][T20944] shmem 81920 [ 649.565068][T20944] file_mapped 0 [ 649.565068][T20944] file_dirty 0 [ 649.565068][T20944] file_writeback 0 [ 649.565068][T20944] anon_thp 4194304 [ 649.565068][T20944] inactive_anon 0 [ 649.565068][T20944] active_anon 4534272 [ 649.565068][T20944] inactive_file 135168 [ 649.565068][T20944] active_file 0 [ 649.565068][T20944] unevictable 0 [ 649.565068][T20944] slab_reclaimable 135168 [ 649.565068][T20944] slab_unreclaimable 450560 [ 649.565068][T20944] pgfault 38478 [ 649.565068][T20944] pgmajfault 0 [ 649.565068][T20944] workingset_refault 0 [ 649.565068][T20944] workingset_activate 0 [ 649.565068][T20944] workingset_nodereclaim 0 [ 649.565068][T20944] pgrefill 66 [ 649.565068][T20944] pgscan 67 [ 649.565068][T20944] pgsteal 0 [ 649.565068][T20944] pgactivate 33 [ 649.661460][T20944] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18662,uid=0 [ 649.677531][T20944] Memory cgroup out of memory: Killed process 18662 (syz-executor.1) total-vm:72584kB, anon-rss:2196kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 649.696429][ T1062] oom_reaper: reaped process 18662 (syz-executor.1), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 649.704812][T20944] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 649.721067][T20944] CPU: 0 PID: 20944 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 649.728966][T20944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.739019][T20944] Call Trace: [ 649.742331][T20944] dump_stack+0xf5/0x159 [ 649.746583][T20944] dump_header+0xaa/0x449 [ 649.750903][T20944] oom_kill_process.cold+0x10/0x15 [ 649.755998][T20944] out_of_memory+0x231/0xa00 [ 649.760582][T20944] mem_cgroup_out_of_memory+0x128/0x150 [ 649.766116][T20944] memory_max_write+0x17b/0x250 [ 649.770958][T20944] cgroup_file_write+0x119/0x320 [ 649.775896][T20944] ? high_work_func+0x30/0x30 [ 649.780558][T20944] ? kernfs_get_active+0x9b/0xd0 [ 649.785482][T20944] kernfs_fop_write+0x1f4/0x2e0 [ 649.790319][T20944] ? cgroup_css.part.0+0x90/0x90 [ 649.795256][T20944] __vfs_write+0x67/0xc0 [ 649.799483][T20944] ? kernfs_seq_show+0xe0/0xe0 [ 649.804229][T20944] vfs_write+0x18a/0x390 [ 649.808459][T20944] ksys_write+0xd5/0x1b0 [ 649.812687][T20944] __x64_sys_write+0x4c/0x60 [ 649.817261][T20944] do_syscall_64+0xcc/0x370 [ 649.821750][T20944] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 649.827625][T20944] RIP: 0033:0x45a219 [ 649.831505][T20944] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.851107][T20944] RSP: 002b:00007feb5be7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 649.859499][T20944] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 649.867465][T20944] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 649.875431][T20944] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 649.883439][T20944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb5be7b6d4 [ 649.891402][T20944] R13: 00000000004cab4b R14: 00000000004e3000 R15: 00000000ffffffff [ 649.900102][T20944] memory: usage 3048kB, limit 0kB, failcnt 50 [ 649.906228][T20944] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 649.913112][T20944] Memory cgroup stats for /syz1: [ 649.913256][T20944] anon 2355200 [ 649.913256][T20944] file 118784 [ 649.913256][T20944] kernel_stack 73728 [ 649.913256][T20944] slab 585728 [ 649.913256][T20944] sock 0 [ 649.913256][T20944] shmem 81920 [ 649.913256][T20944] file_mapped 0 [ 649.913256][T20944] file_dirty 0 [ 649.913256][T20944] file_writeback 0 [ 649.913256][T20944] anon_thp 2097152 [ 649.913256][T20944] inactive_anon 0 [ 649.913256][T20944] active_anon 2355200 [ 649.913256][T20944] inactive_file 135168 [ 649.913256][T20944] active_file 0 [ 649.913256][T20944] unevictable 0 [ 649.913256][T20944] slab_reclaimable 135168 [ 649.913256][T20944] slab_unreclaimable 450560 [ 649.913256][T20944] pgfault 38478 [ 649.913256][T20944] pgmajfault 0 [ 649.913256][T20944] workingset_refault 0 [ 649.913256][T20944] workingset_activate 0 [ 649.913256][T20944] workingset_nodereclaim 0 [ 649.913256][T20944] pgrefill 66 [ 649.913256][T20944] pgscan 67 [ 649.913256][T20944] pgsteal 0 [ 649.913256][T20944] pgactivate 33 [ 650.008420][T20944] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=20941,uid=0 [ 650.024372][T20944] Memory cgroup out of memory: Killed process 20941 (syz-executor.1) total-vm:72716kB, anon-rss:2152kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 650.043628][ T1062] oom_reaper: reaped process 20941 (syz-executor.1), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 23:26:42 executing program 4: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 23:26:42 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(0xffffffffffffffff) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 23:26:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 23:26:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{0xffffffffffffffff, 0x80}], 0x1, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:42 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000001c000000ed03000002000000010000000000000e02000000000000000000030000000004000000400000131f7c4e148c"], &(0x7f0000000280)=""/236, 0x3c, 0xec, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r5 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, 0x0}, 0x70) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00'}, 0x30) write$cgroup_int(r5, 0x0, 0x0) [ 650.525434][T12633] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 650.549031][T12633] CPU: 0 PID: 12633 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 650.556976][T12633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.567031][T12633] Call Trace: [ 650.570331][T12633] dump_stack+0xf5/0x159 [ 650.574684][T12633] dump_header+0xaa/0x449 [ 650.579054][T12633] oom_kill_process.cold+0x10/0x15 [ 650.584180][T12633] out_of_memory+0x231/0xa00 [ 650.588815][T12633] mem_cgroup_out_of_memory+0x128/0x150 [ 650.594381][T12633] try_charge+0xb3a/0xbc0 [ 650.598756][T12633] ? __read_once_size+0x5a/0xe0 [ 650.603628][T12633] ? page_trans_huge_mapcount+0x130/0x2b0 [ 650.609360][T12633] ? __rcu_read_unlock+0x66/0x3c0 [ 650.614391][T12633] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 650.619939][T12633] ? get_mem_cgroup_from_mm+0xb6/0x1c0 23:26:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 650.625403][T12633] __memcg_kmem_charge+0xde/0x240 [ 650.630460][T12633] copy_process+0x11d2/0x3b50 [ 650.635250][T12633] _do_fork+0xfe/0x6e0 [ 650.639375][T12633] ? __read_once_size+0x5a/0xe0 [ 650.644236][T12633] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 650.649967][T12633] ? _copy_to_user+0x84/0xb0 [ 650.654569][T12633] __x64_sys_clone+0x12b/0x160 [ 650.659381][T12633] do_syscall_64+0xcc/0x370 [ 650.663900][T12633] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 650.669801][T12633] RIP: 0033:0x4587ea [ 650.673742][T12633] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 650.693470][T12633] RSP: 002b:00007fff604518b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 650.701887][T12633] RAX: ffffffffffffffda RBX: 00007fff604518b0 RCX: 00000000004587ea [ 650.709853][T12633] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 650.717825][T12633] RBP: 00007fff604518f0 R08: 0000000000000001 R09: 0000000001086940 23:26:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380), 0x0, 0x0) 23:26:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) [ 650.725792][T12633] R10: 0000000001086c10 R11: 0000000000000246 R12: 0000000000000001 [ 650.733760][T12633] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff60451940 [ 650.750462][T12633] memory: usage 728kB, limit 0kB, failcnt 59 [ 650.775798][T12633] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 650.833541][T12633] Memory cgroup stats for /syz1: [ 650.839700][T12633] anon 159744 [ 650.839700][T12633] file 118784 [ 650.839700][T12633] kernel_stack 36864 [ 650.839700][T12633] slab 585728 [ 650.839700][T12633] sock 0 [ 650.839700][T12633] shmem 81920 [ 650.839700][T12633] file_mapped 0 [ 650.839700][T12633] file_dirty 0 [ 650.839700][T12633] file_writeback 0 [ 650.839700][T12633] anon_thp 0 [ 650.839700][T12633] inactive_anon 0 [ 650.839700][T12633] active_anon 159744 [ 650.839700][T12633] inactive_file 135168 [ 650.839700][T12633] active_file 0 [ 650.839700][T12633] unevictable 0 [ 650.839700][T12633] slab_reclaimable 135168 [ 650.839700][T12633] slab_unreclaimable 450560 [ 650.839700][T12633] pgfault 38511 [ 650.839700][T12633] pgmajfault 0 [ 650.839700][T12633] workingset_refault 0 [ 650.839700][T12633] workingset_activate 0 [ 650.839700][T12633] workingset_nodereclaim 0 [ 650.839700][T12633] pgrefill 99 [ 650.839700][T12633] pgscan 67 [ 650.839700][T12633] pgsteal 0 [ 650.839700][T12633] pgactivate 33 23:26:43 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(0xffffffffffffffff) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380), 0x0, 0x0) 23:26:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) [ 651.167163][T12633] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=12633,uid=0 [ 651.185370][T12633] Memory cgroup out of memory: Killed process 12633 (syz-executor.1) total-vm:72452kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 651.217604][ T1062] oom_reaper: reaped process 12633 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 652.381486][ T100] device bridge_slave_1 left promiscuous mode [ 652.387692][ T100] bridge0: port 2(bridge_slave_1) entered disabled state [ 652.431444][ T100] device bridge_slave_0 left promiscuous mode [ 652.437648][ T100] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.191268][ T100] device hsr_slave_0 left promiscuous mode [ 653.240976][ T100] device hsr_slave_1 left promiscuous mode [ 653.288530][ T100] team0 (unregistering): Port device team_slave_1 removed [ 653.298722][ T100] team0 (unregistering): Port device team_slave_0 removed [ 653.308697][ T100] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 653.365423][ T100] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 653.442973][ T100] bond0 (unregistering): Released all slaves 23:26:50 executing program 4: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 23:26:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380), 0x0, 0x0) 23:26:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:26:50 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{0xffffffffffffffff, 0x80}], 0x1, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:50 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000001c000000ed03000002000000010000000000000e02000000000000000000030000000004000000400000131f7c4e148c"], &(0x7f0000000280)=""/236, 0x3c, 0xec, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r5 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, 0x0}, 0x70) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00'}, 0x30) write$cgroup_int(r5, 0x0, 0x0) 23:26:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:50 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 23:26:50 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}], 0x2}], 0x1, 0x0) [ 660.163435][T21152] IPVS: ftp: loaded support on port[0] = 21 [ 660.215035][T21152] chnl_net:caif_netlink_parms(): no params data found [ 660.242270][T21152] bridge0: port 1(bridge_slave_0) entered blocking state [ 660.249423][T21152] bridge0: port 1(bridge_slave_0) entered disabled state [ 660.257054][T21152] device bridge_slave_0 entered promiscuous mode [ 660.264469][T21152] bridge0: port 2(bridge_slave_1) entered blocking state [ 660.271590][T21152] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.279110][T21152] device bridge_slave_1 entered promiscuous mode [ 660.296222][T21152] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 660.306427][T21152] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 660.325091][T21152] team0: Port device team_slave_0 added [ 660.331897][T21152] team0: Port device team_slave_1 added [ 660.384073][T21152] device hsr_slave_0 entered promiscuous mode [ 660.421328][T21152] device hsr_slave_1 entered promiscuous mode [ 660.471031][T21152] debugfs: Directory 'hsr0' with parent '/' already present! [ 660.485967][T21152] bridge0: port 2(bridge_slave_1) entered blocking state [ 660.493075][T21152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 660.500352][T21152] bridge0: port 1(bridge_slave_0) entered blocking state [ 660.507519][T21152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 660.537958][T21152] 8021q: adding VLAN 0 to HW filter on device bond0 [ 660.549432][ T2861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 660.557916][ T2861] bridge0: port 1(bridge_slave_0) entered disabled state [ 660.565955][ T2861] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.574806][ T2861] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 660.587156][T21152] 8021q: adding VLAN 0 to HW filter on device team0 [ 660.597312][T19261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 660.606199][T19261] bridge0: port 1(bridge_slave_0) entered blocking state [ 660.613249][T19261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 660.624777][T19262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 660.633378][T19262] bridge0: port 2(bridge_slave_1) entered blocking state [ 660.640417][T19262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 660.665558][T21152] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 660.676728][T21152] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 660.689082][T19262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 660.698279][T19262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 660.707258][T19262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 660.715914][T19262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 660.724361][T19262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 660.732501][T19262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 660.748351][ T2861] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 660.757982][ T2861] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 660.768816][T21152] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 660.885043][T21159] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 660.895464][T21159] CPU: 0 PID: 21159 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 660.903370][T21159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.913415][T21159] Call Trace: [ 660.916710][T21159] dump_stack+0xf5/0x159 [ 660.920952][T21159] dump_header+0xaa/0x449 [ 660.925285][T21159] oom_kill_process.cold+0x10/0x15 [ 660.930409][T21159] out_of_memory+0x231/0xa00 [ 660.935012][T21159] mem_cgroup_out_of_memory+0x128/0x150 [ 660.940560][T21159] memory_max_write+0x17b/0x250 [ 660.945417][T21159] cgroup_file_write+0x119/0x320 [ 660.950353][T21159] ? high_work_func+0x30/0x30 [ 660.955029][T21159] ? kernfs_get_active+0x9b/0xd0 [ 660.959968][T21159] kernfs_fop_write+0x1f4/0x2e0 [ 660.964914][T21159] ? cgroup_css.part.0+0x90/0x90 [ 660.969852][T21159] __vfs_write+0x67/0xc0 [ 660.974093][T21159] ? kernfs_seq_show+0xe0/0xe0 [ 660.978863][T21159] vfs_write+0x18a/0x390 [ 660.983121][T21159] ksys_write+0xd5/0x1b0 [ 660.987364][T21159] __x64_sys_write+0x4c/0x60 [ 660.991953][T21159] do_syscall_64+0xcc/0x370 [ 660.996459][T21159] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 661.002357][T21159] RIP: 0033:0x45a219 [ 661.006265][T21159] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 661.025865][T21159] RSP: 002b:00007f69870f1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 661.034268][T21159] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 661.042229][T21159] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 661.050194][T21159] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 661.058158][T21159] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69870f26d4 [ 661.066124][T21159] R13: 00000000004cab4b R14: 00000000004e3000 R15: 00000000ffffffff [ 661.077278][T21159] memory: usage 2736kB, limit 0kB, failcnt 68 [ 661.083661][T21159] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 661.090507][T21159] Memory cgroup stats for /syz1: [ 661.090607][T21159] anon 2256896 [ 661.090607][T21159] file 118784 [ 661.090607][T21159] kernel_stack 36864 [ 661.090607][T21159] slab 446464 [ 661.090607][T21159] sock 0 [ 661.090607][T21159] shmem 81920 [ 661.090607][T21159] file_mapped 0 [ 661.090607][T21159] file_dirty 0 [ 661.090607][T21159] file_writeback 0 [ 661.090607][T21159] anon_thp 2097152 [ 661.090607][T21159] inactive_anon 0 [ 661.090607][T21159] active_anon 2256896 [ 661.090607][T21159] inactive_file 135168 [ 661.090607][T21159] active_file 0 [ 661.090607][T21159] unevictable 0 [ 661.090607][T21159] slab_reclaimable 135168 [ 661.090607][T21159] slab_unreclaimable 311296 [ 661.090607][T21159] pgfault 38577 [ 661.090607][T21159] pgmajfault 0 [ 661.090607][T21159] workingset_refault 0 [ 661.090607][T21159] workingset_activate 0 [ 661.090607][T21159] workingset_nodereclaim 0 [ 661.090607][T21159] pgrefill 99 [ 661.090607][T21159] pgscan 67 [ 661.090607][T21159] pgsteal 0 [ 661.090607][T21159] pgactivate 66 [ 661.186694][T21159] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=21158,uid=0 [ 661.202737][T21159] Memory cgroup out of memory: Killed process 21158 (syz-executor.1) total-vm:72588kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 661.224561][ T1062] oom_reaper: reaped process 21158 (syz-executor.1), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 661.262102][T21152] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 661.272099][T21152] CPU: 1 PID: 21152 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 661.279967][T21152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.290098][T21152] Call Trace: [ 661.293380][T21152] dump_stack+0xf5/0x159 [ 661.297608][T21152] dump_header+0xaa/0x449 [ 661.302000][T21152] oom_kill_process.cold+0x10/0x15 [ 661.307147][T21152] out_of_memory+0x231/0xa00 [ 661.311732][T21152] mem_cgroup_out_of_memory+0x128/0x150 [ 661.317319][T21152] try_charge+0xb3a/0xbc0 [ 661.321643][T21152] ? __rcu_read_unlock+0x50/0x3c0 [ 661.326668][T21152] mem_cgroup_try_charge+0xd2/0x260 [ 661.331854][T21152] mem_cgroup_try_charge_delay+0x3a/0x80 [ 661.337483][T21152] wp_page_copy+0x322/0x1120 [ 661.342080][T21152] ? __read_once_size+0x41/0xe0 [ 661.346983][T21152] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 661.352858][T21152] do_wp_page+0x192/0x11f0 [ 661.357317][T21152] __handle_mm_fault+0x1ab1/0x2c70 [ 661.362443][T21152] handle_mm_fault+0x21b/0x530 [ 661.367228][T21152] __do_page_fault+0x3fb/0x9e0 [ 661.372060][T21152] do_page_fault+0x54/0x233 [ 661.376576][T21152] ? prepare_exit_to_usermode+0x154/0x1a0 [ 661.382317][T21152] page_fault+0x34/0x40 [ 661.386462][T21152] RIP: 0033:0x4312f6 [ 661.390353][T21152] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 76 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 ec 59 64 00 85 c0 0f 84 [ 661.410039][T21152] RSP: 002b:00007ffccb0928f0 EFLAGS: 00010206 [ 661.416084][T21152] RAX: 0000000000019691 RBX: 0000000000717640 RCX: 0000000000008041 [ 661.424077][T21152] RDX: 0000000002209930 RSI: 0000000002211970 RDI: 0000000000000003 [ 661.432042][T21152] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002208940 [ 661.440050][T21152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000717698 [ 661.448003][T21152] R13: 0000000000717698 R14: 0000000000000000 R15: 0000000000002710 [ 661.456961][T21152] memory: usage 432kB, limit 0kB, failcnt 76 [ 661.462987][T21152] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 661.469888][T21152] Memory cgroup stats for /syz1: [ 661.469977][T21152] anon 86016 [ 661.469977][T21152] file 118784 [ 661.469977][T21152] kernel_stack 36864 [ 661.469977][T21152] slab 446464 [ 661.469977][T21152] sock 0 [ 661.469977][T21152] shmem 81920 [ 661.469977][T21152] file_mapped 0 [ 661.469977][T21152] file_dirty 0 [ 661.469977][T21152] file_writeback 0 [ 661.469977][T21152] anon_thp 0 [ 661.469977][T21152] inactive_anon 0 [ 661.469977][T21152] active_anon 86016 [ 661.469977][T21152] inactive_file 135168 [ 661.469977][T21152] active_file 0 [ 661.469977][T21152] unevictable 0 [ 661.469977][T21152] slab_reclaimable 135168 [ 661.469977][T21152] slab_unreclaimable 311296 [ 661.469977][T21152] pgfault 38577 [ 661.469977][T21152] pgmajfault 0 [ 661.469977][T21152] workingset_refault 0 [ 661.469977][T21152] workingset_activate 0 [ 661.469977][T21152] workingset_nodereclaim 0 [ 661.469977][T21152] pgrefill 99 [ 661.469977][T21152] pgscan 100 [ 661.469977][T21152] pgsteal 0 [ 661.469977][T21152] pgactivate 66 [ 661.564823][T21152] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=21152,uid=0 [ 661.580542][T21152] Memory cgroup out of memory: Killed process 21152 (syz-executor.1) total-vm:72456kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 661.599111][ T1062] oom_reaper: reaped process 21152 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 662.651607][ T21] device bridge_slave_1 left promiscuous mode [ 662.658066][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.711697][ T21] device bridge_slave_0 left promiscuous mode [ 662.717935][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 663.451044][ T21] device hsr_slave_0 left promiscuous mode [ 663.510978][ T21] device hsr_slave_1 left promiscuous mode [ 663.568051][ T21] team0 (unregistering): Port device team_slave_1 removed [ 663.578551][ T21] team0 (unregistering): Port device team_slave_0 removed [ 663.589017][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 663.645205][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 663.752751][ T21] bond0 (unregistering): Released all slaves 23:26:58 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000001c000000ed03000002000000010000000000000e02000000000000000000030000000004000000400000131f7c4e148c"], &(0x7f0000000280)=""/236, 0x3c, 0xec, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r5 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, 0x0}, 0x70) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00'}, 0x30) write$cgroup_int(r5, 0x0, 0x0) 23:26:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:26:58 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(0x0, 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:26:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}], 0x2}], 0x1, 0x0) 23:26:58 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000001c000000ed03000002000000010000000000000e02000000000000000000030000000004000000400000131f7c4e148c"], &(0x7f0000000280)=""/236, 0x3c, 0xec, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r5 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, 0x0}, 0x70) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00'}, 0x30) write$cgroup_int(r5, 0x0, 0x0) 23:26:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}], 0x2}], 0x1, 0x0) 23:26:58 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(0x0, 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {0x0}], 0x3}], 0x1, 0x0) 23:26:59 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(0x0, 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:26:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {0x0}], 0x3}], 0x1, 0x0) 23:26:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) [ 668.398547][T21212] IPVS: ftp: loaded support on port[0] = 21 [ 668.450113][T21212] chnl_net:caif_netlink_parms(): no params data found [ 668.476799][T21212] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.484043][T21212] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.491969][T21212] device bridge_slave_0 entered promiscuous mode [ 668.499359][T21212] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.506467][T21212] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.514278][T21212] device bridge_slave_1 entered promiscuous mode [ 668.531763][T21212] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 668.542552][T21212] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 668.560053][T21212] team0: Port device team_slave_0 added [ 668.566708][T21212] team0: Port device team_slave_1 added [ 668.653679][T21212] device hsr_slave_0 entered promiscuous mode [ 668.701525][T21212] device hsr_slave_1 entered promiscuous mode [ 668.750946][T21212] debugfs: Directory 'hsr0' with parent '/' already present! [ 668.764880][T21212] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.773448][T21212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.780676][T21212] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.787812][T21212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.818368][T21212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 668.829610][ T8082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 668.838314][ T8082] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.846369][ T8082] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.855203][ T8082] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 668.866763][T21212] 8021q: adding VLAN 0 to HW filter on device team0 [ 668.877675][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 668.886544][ T3008] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.893598][ T3008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.905154][T19261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 668.914102][T19261] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.921196][T19261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.943562][ T8082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 668.952664][ T8082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 668.961645][ T8082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 668.970015][ T8082] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 668.980643][T19261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 668.990779][T21212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 669.006005][T19261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 669.013797][T19261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 669.024869][T21212] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 669.115808][T21219] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 669.126246][T21219] CPU: 0 PID: 21219 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 669.134133][T21219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.144179][T21219] Call Trace: [ 669.147477][T21219] dump_stack+0xf5/0x159 [ 669.151727][T21219] dump_header+0xaa/0x449 [ 669.156056][T21219] oom_kill_process.cold+0x10/0x15 [ 669.161169][T21219] out_of_memory+0x231/0xa00 [ 669.165762][T21219] mem_cgroup_out_of_memory+0x128/0x150 [ 669.171311][T21219] memory_max_write+0x17b/0x250 [ 669.176163][T21219] cgroup_file_write+0x119/0x320 [ 669.181095][T21219] ? high_work_func+0x30/0x30 [ 669.185768][T21219] ? kernfs_get_active+0x9b/0xd0 [ 669.190702][T21219] kernfs_fop_write+0x1f4/0x2e0 [ 669.195544][T21219] ? cgroup_css.part.0+0x90/0x90 [ 669.200495][T21219] __vfs_write+0x67/0xc0 [ 669.204761][T21219] ? kernfs_seq_show+0xe0/0xe0 [ 669.209520][T21219] vfs_write+0x18a/0x390 [ 669.213760][T21219] ksys_write+0xd5/0x1b0 [ 669.218002][T21219] __x64_sys_write+0x4c/0x60 [ 669.222605][T21219] do_syscall_64+0xcc/0x370 [ 669.227112][T21219] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 669.233001][T21219] RIP: 0033:0x45a219 [ 669.236897][T21219] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 669.256515][T21219] RSP: 002b:00007f6fcf5a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 669.264920][T21219] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 669.272881][T21219] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 669.280847][T21219] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 669.288808][T21219] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6fcf5a16d4 [ 669.296783][T21219] R13: 00000000004cab4b R14: 00000000004e3000 R15: 00000000ffffffff [ 669.307534][T21219] memory: usage 2648kB, limit 0kB, failcnt 77 [ 669.313658][T21219] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 669.320489][T21219] Memory cgroup stats for /syz1: [ 669.320575][T21219] anon 2236416 [ 669.320575][T21219] file 118784 [ 669.320575][T21219] kernel_stack 36864 [ 669.320575][T21219] slab 446464 [ 669.320575][T21219] sock 0 [ 669.320575][T21219] shmem 81920 [ 669.320575][T21219] file_mapped 0 [ 669.320575][T21219] file_dirty 0 [ 669.320575][T21219] file_writeback 0 [ 669.320575][T21219] anon_thp 2097152 [ 669.320575][T21219] inactive_anon 0 [ 669.320575][T21219] active_anon 2236416 [ 669.320575][T21219] inactive_file 135168 [ 669.320575][T21219] active_file 0 [ 669.320575][T21219] unevictable 0 [ 669.320575][T21219] slab_reclaimable 135168 [ 669.320575][T21219] slab_unreclaimable 311296 [ 669.320575][T21219] pgfault 38643 [ 669.320575][T21219] pgmajfault 0 [ 669.320575][T21219] workingset_refault 0 [ 669.320575][T21219] workingset_activate 0 [ 669.320575][T21219] workingset_nodereclaim 0 [ 669.320575][T21219] pgrefill 99 [ 669.320575][T21219] pgscan 133 [ 669.320575][T21219] pgsteal 0 [ 669.320575][T21219] pgactivate 66 [ 669.416161][T21219] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=21218,uid=0 [ 669.432325][T21219] Memory cgroup out of memory: Killed process 21218 (syz-executor.1) total-vm:72588kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 669.454209][ T1062] oom_reaper: reaped process 21218 (syz-executor.1), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 669.489192][T21212] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 669.499180][T21212] CPU: 0 PID: 21212 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 669.507094][T21212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.517302][T21212] Call Trace: [ 669.520582][T21212] dump_stack+0xf5/0x159 [ 669.524928][T21212] dump_header+0xaa/0x449 [ 669.529357][T21212] oom_kill_process.cold+0x10/0x15 [ 669.534452][T21212] out_of_memory+0x231/0xa00 [ 669.539093][T21212] mem_cgroup_out_of_memory+0x128/0x150 [ 669.544684][T21212] try_charge+0xb3a/0xbc0 [ 669.549000][T21212] ? __rcu_read_unlock+0x50/0x3c0 [ 669.554052][T21212] mem_cgroup_try_charge+0xd2/0x260 [ 669.559234][T21212] mem_cgroup_try_charge_delay+0x3a/0x80 [ 669.564852][T21212] wp_page_copy+0x322/0x1120 [ 669.569430][T21212] ? __read_once_size+0x41/0xe0 [ 669.574268][T21212] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 669.580191][T21212] do_wp_page+0x192/0x11f0 [ 669.584668][T21212] __handle_mm_fault+0x1ab1/0x2c70 [ 669.589880][T21212] handle_mm_fault+0x21b/0x530 [ 669.594630][T21212] __do_page_fault+0x3fb/0x9e0 [ 669.599378][T21212] do_page_fault+0x54/0x233 [ 669.603871][T21212] ? prepare_exit_to_usermode+0x154/0x1a0 [ 669.609621][T21212] page_fault+0x34/0x40 [ 669.613755][T21212] RIP: 0033:0x4312f6 [ 669.617637][T21212] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 76 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 ec 59 64 00 85 c0 0f 84 [ 669.637392][T21212] RSP: 002b:00007ffdfd86a1b0 EFLAGS: 00010206 [ 669.643453][T21212] RAX: 0000000000019691 RBX: 0000000000717640 RCX: 0000000000008041 [ 669.651406][T21212] RDX: 00000000019e2930 RSI: 00000000019ea970 RDI: 0000000000000003 [ 669.659436][T21212] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000019e1940 [ 669.667415][T21212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000717698 [ 669.675462][T21212] R13: 0000000000717698 R14: 0000000000000000 R15: 0000000000002710 [ 669.685309][T21212] memory: usage 352kB, limit 0kB, failcnt 85 [ 669.692198][T21212] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 669.699035][T21212] Memory cgroup stats for /syz1: [ 669.699254][T21212] anon 69632 [ 669.699254][T21212] file 118784 [ 669.699254][T21212] kernel_stack 36864 [ 669.699254][T21212] slab 446464 [ 669.699254][T21212] sock 0 [ 669.699254][T21212] shmem 81920 [ 669.699254][T21212] file_mapped 0 [ 669.699254][T21212] file_dirty 0 [ 669.699254][T21212] file_writeback 0 [ 669.699254][T21212] anon_thp 0 [ 669.699254][T21212] inactive_anon 0 [ 669.699254][T21212] active_anon 69632 [ 669.699254][T21212] inactive_file 135168 [ 669.699254][T21212] active_file 0 [ 669.699254][T21212] unevictable 0 [ 669.699254][T21212] slab_reclaimable 135168 [ 669.699254][T21212] slab_unreclaimable 311296 [ 669.699254][T21212] pgfault 38643 [ 669.699254][T21212] pgmajfault 0 [ 669.699254][T21212] workingset_refault 0 [ 669.699254][T21212] workingset_activate 0 [ 669.699254][T21212] workingset_nodereclaim 0 [ 669.699254][T21212] pgrefill 99 [ 669.699254][T21212] pgscan 133 [ 669.699254][T21212] pgsteal 0 [ 669.699254][T21212] pgactivate 66 [ 669.794167][T21212] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=21212,uid=0 [ 669.810510][T21212] Memory cgroup out of memory: Killed process 21212 (syz-executor.1) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 669.829390][ T1062] oom_reaper: reaped process 21212 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 670.772036][ T21] device bridge_slave_1 left promiscuous mode [ 670.778234][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.841598][ T21] device bridge_slave_0 left promiscuous mode [ 670.847809][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 671.581104][ T21] device hsr_slave_0 left promiscuous mode [ 671.621010][ T21] device hsr_slave_1 left promiscuous mode [ 671.668218][ T21] team0 (unregistering): Port device team_slave_1 removed [ 671.678527][ T21] team0 (unregistering): Port device team_slave_0 removed [ 671.688664][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 671.745233][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 671.802749][ T21] bond0 (unregistering): Released all slaves 23:27:07 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000001c000000ed03000002000000010000000000000e02000000000000000000030000000004000000400000131f7c4e148c"], &(0x7f0000000280)=""/236, 0x3c, 0xec, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r5 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, 0x0}, 0x70) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00'}, 0x30) write$cgroup_int(r5, 0x0, 0x0) 23:27:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:27:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {0x0}], 0x3}], 0x1, 0x0) 23:27:07 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x14, 0x2, 0x8000000002, 0xffffffffffffffff}, 0x14}}, 0x0) 23:27:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)}], 0x3}], 0x1, 0x0) 23:27:08 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)}], 0x3}], 0x1, 0x0) 23:27:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)}], 0x3}], 0x1, 0x0) 23:27:08 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a944", 0x24}], 0x3}], 0x1, 0x0) [ 677.737234][T21271] IPVS: ftp: loaded support on port[0] = 21 [ 677.788312][T21271] chnl_net:caif_netlink_parms(): no params data found [ 677.815772][T21271] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.823141][T21271] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.830920][T21271] device bridge_slave_0 entered promiscuous mode [ 677.838228][T21271] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.845405][T21271] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.853070][T21271] device bridge_slave_1 entered promiscuous mode [ 677.870426][T21271] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 677.880946][T21271] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 677.899208][T21271] team0: Port device team_slave_0 added [ 677.909077][T21271] team0: Port device team_slave_1 added [ 677.962922][T21271] device hsr_slave_0 entered promiscuous mode [ 678.001216][T21271] device hsr_slave_1 entered promiscuous mode [ 678.040924][T21271] debugfs: Directory 'hsr0' with parent '/' already present! [ 678.055760][T21271] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.062855][T21271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.070168][T21271] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.077212][T21271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.107530][T21271] 8021q: adding VLAN 0 to HW filter on device bond0 [ 678.119019][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 678.127166][ T3008] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.135364][ T3008] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.144604][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 678.156181][T21271] 8021q: adding VLAN 0 to HW filter on device team0 [ 678.168039][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 678.176855][ T8109] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.183894][ T8109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.202195][ T2861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 678.210506][ T2861] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.217684][ T2861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.226656][ T2861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 678.238321][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 678.246600][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 678.257761][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 678.269744][T21271] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 678.281747][T21271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 678.290001][T19261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 678.305545][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 678.313406][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 678.324976][T21271] 8021q: adding VLAN 0 to HW filter on device batadv0 23:27:17 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000001c000000ed03000002000000010000000000000e02000000000000000000030000000004000000400000131f7c4e148c"], &(0x7f0000000280)=""/236, 0x3c, 0xec, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r5 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, 0x0}, 0x70) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00'}, 0x30) write$cgroup_int(r5, 0x0, 0x0) 23:27:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, &(0x7f0000000140), 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:27:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a944", 0x24}], 0x3}], 0x1, 0x0) 23:27:17 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:27:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a944", 0x24}], 0x3}], 0x1, 0x0) 23:27:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159b", 0x36}], 0x3}], 0x1, 0x0) 23:27:17 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r7) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r8, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r8, &(0x7f00000000c0)=ANY=[], 0x0) r9 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r10 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r10, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r9, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16=r10, @ANYBLOB="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"], 0x3}}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r11, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:17 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159b", 0x36}], 0x3}], 0x1, 0x0) 23:27:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159b", 0x36}], 0x3}], 0x1, 0x0) [ 693.186180][T21335] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 693.196571][T21335] CPU: 1 PID: 21335 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 693.204451][T21335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.214487][T21335] Call Trace: [ 693.217826][T21335] dump_stack+0xf5/0x159 [ 693.222058][T21335] dump_header+0xaa/0x449 [ 693.226377][T21335] oom_kill_process.cold+0x10/0x15 [ 693.231474][T21335] out_of_memory+0x231/0xa00 [ 693.236068][T21335] mem_cgroup_out_of_memory+0x128/0x150 [ 693.241605][T21335] memory_max_write+0x17b/0x250 [ 693.246444][T21335] cgroup_file_write+0x119/0x320 [ 693.251377][T21335] ? high_work_func+0x30/0x30 [ 693.256051][T21335] ? kernfs_get_active+0x9b/0xd0 [ 693.260973][T21335] kernfs_fop_write+0x1f4/0x2e0 [ 693.265817][T21335] ? cgroup_css.part.0+0x90/0x90 [ 693.270741][T21335] __vfs_write+0x67/0xc0 [ 693.274981][T21335] ? kernfs_seq_show+0xe0/0xe0 [ 693.279729][T21335] vfs_write+0x18a/0x390 [ 693.283960][T21335] ksys_write+0xd5/0x1b0 [ 693.288213][T21335] __x64_sys_write+0x4c/0x60 [ 693.292789][T21335] do_syscall_64+0xcc/0x370 [ 693.297281][T21335] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 693.303153][T21335] RIP: 0033:0x45a219 [ 693.307036][T21335] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.326620][T21335] RSP: 002b:00007fa108e62c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 693.335012][T21335] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 693.342964][T21335] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 693.350916][T21335] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 693.358880][T21335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa108e636d4 [ 693.366852][T21335] R13: 00000000004cab4b R14: 00000000004e3000 R15: 00000000ffffffff [ 693.375500][T21335] memory: usage 32144kB, limit 0kB, failcnt 35 [ 693.381772][T21335] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 693.388658][T21335] Memory cgroup stats for /syz4: [ 693.388809][T21335] anon 30724096 [ 693.388809][T21335] file 53248 [ 693.388809][T21335] kernel_stack 184320 [ 693.388809][T21335] slab 921600 [ 693.388809][T21335] sock 229376 [ 693.388809][T21335] shmem 0 [ 693.388809][T21335] file_mapped 0 [ 693.388809][T21335] file_dirty 0 [ 693.388809][T21335] file_writeback 0 [ 693.388809][T21335] anon_thp 29360128 [ 693.388809][T21335] inactive_anon 0 [ 693.388809][T21335] active_anon 30679040 [ 693.388809][T21335] inactive_file 98304 [ 693.388809][T21335] active_file 0 [ 693.388809][T21335] unevictable 0 [ 693.388809][T21335] slab_reclaimable 405504 [ 693.388809][T21335] slab_unreclaimable 516096 [ 693.388809][T21335] pgfault 45342 [ 693.388809][T21335] pgmajfault 0 [ 693.388809][T21335] workingset_refault 0 [ 693.388809][T21335] workingset_activate 0 [ 693.388809][T21335] workingset_nodereclaim 0 [ 693.388809][T21335] pgrefill 76 [ 693.388809][T21335] pgscan 8261 [ 693.388809][T21335] pgsteal 8252 [ 693.388809][T21335] pgactivate 0 23:27:25 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r7) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r8, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r8, &(0x7f00000000c0)=ANY=[], 0x0) r9 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r10 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r10, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r9, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16=r10, @ANYBLOB="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"], 0x3}}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r11, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:25 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:25 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r7) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r8, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r8, &(0x7f00000000c0)=ANY=[], 0x0) r9 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r10 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r10, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r9, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16=r10, @ANYBLOB="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"], 0x3}}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r11, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}], 0x1, 0x0, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 23:27:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a", 0x3f}], 0x3}], 0x1, 0x0) [ 693.484668][T21335] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14032,uid=0 [ 693.500196][T21335] Memory cgroup out of memory: Killed process 14032 (syz-executor.4) total-vm:72716kB, anon-rss:6304kB, file-rss:35880kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 [ 693.519018][ T1062] oom_reaper: reaped process 14032 (syz-executor.4), now anon-rss:0kB, file-rss:34920kB, shmem-rss:0kB [ 693.624959][T12561] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 693.635314][T12561] CPU: 0 PID: 12561 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 693.643222][T12561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.653280][T12561] Call Trace: [ 693.656638][T12561] dump_stack+0xf5/0x159 [ 693.660895][T12561] dump_header+0xaa/0x449 [ 693.665226][T12561] oom_kill_process.cold+0x10/0x15 [ 693.670414][T12561] out_of_memory+0x231/0xa00 [ 693.674998][T12561] mem_cgroup_out_of_memory+0x128/0x150 [ 693.681237][T12561] try_charge+0xb3a/0xbc0 [ 693.685605][T12561] ? __rcu_read_unlock+0x66/0x3c0 [ 693.690624][T12561] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 693.696106][T12561] ? get_mem_cgroup_from_mm+0xb6/0x1c0 [ 693.701608][T12561] __memcg_kmem_charge+0xde/0x240 [ 693.706661][T12561] copy_process+0x11d2/0x3b50 [ 693.711359][T12561] _do_fork+0xfe/0x6e0 [ 693.715467][T12561] ? __read_once_size+0x5a/0xe0 [ 693.720320][T12561] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 693.726057][T12561] ? _copy_to_user+0x84/0xb0 [ 693.730670][T12561] __x64_sys_clone+0x12b/0x160 [ 693.735555][T12561] do_syscall_64+0xcc/0x370 [ 693.740106][T12561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 693.745993][T12561] RIP: 0033:0x4587ea [ 693.749894][T12561] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 23:27:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a", 0x3f}], 0x3}], 0x1, 0x0) [ 693.769512][T12561] RSP: 002b:00007fffae844340 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 693.777935][T12561] RAX: ffffffffffffffda RBX: 00007fffae844340 RCX: 00000000004587ea [ 693.785900][T12561] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 693.793882][T12561] RBP: 00007fffae844380 R08: 0000000000000001 R09: 0000000000db9940 [ 693.801854][T12561] R10: 0000000000db9c10 R11: 0000000000000246 R12: 0000000000000001 [ 693.809817][T12561] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fffae8443d0 [ 693.830992][T12561] memory: usage 23384kB, limit 0kB, failcnt 43 [ 693.837301][T12561] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 693.845197][T12561] Memory cgroup stats for /syz4: [ 693.845649][T12561] anon 22265856 [ 693.845649][T12561] file 53248 [ 693.845649][T12561] kernel_stack 184320 [ 693.845649][T12561] slab 921600 [ 693.845649][T12561] sock 229376 [ 693.845649][T12561] shmem 0 [ 693.845649][T12561] file_mapped 0 [ 693.845649][T12561] file_dirty 0 [ 693.845649][T12561] file_writeback 0 23:27:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) [ 693.845649][T12561] anon_thp 20971520 [ 693.845649][T12561] inactive_anon 0 [ 693.845649][T12561] active_anon 22183936 [ 693.845649][T12561] inactive_file 98304 [ 693.845649][T12561] active_file 0 [ 693.845649][T12561] unevictable 0 [ 693.845649][T12561] slab_reclaimable 405504 [ 693.845649][T12561] slab_unreclaimable 516096 [ 693.845649][T12561] pgfault 45342 [ 693.845649][T12561] pgmajfault 0 [ 693.845649][T12561] workingset_refault 0 [ 693.845649][T12561] workingset_activate 0 [ 693.845649][T12561] workingset_nodereclaim 0 [ 693.845649][T12561] pgrefill 76 [ 693.845649][T12561] pgscan 8261 [ 693.845649][T12561] pgsteal 8252 [ 693.845649][T12561] pgactivate 0 [ 693.945387][T12561] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13958,uid=0 [ 693.961952][T12561] Memory cgroup out of memory: Killed process 13958 (syz-executor.4) total-vm:73112kB, anon-rss:6328kB, file-rss:35832kB, shmem-rss:0kB, UID:0 pgtables:163840kB oom_score_adj:1000 [ 693.981908][ T1062] oom_reaper: reaped process 13958 (syz-executor.4), now anon-rss:0kB, file-rss:34872kB, shmem-rss:0kB [ 693.984206][T12561] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 694.003636][T12561] CPU: 0 PID: 12561 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 694.011530][T12561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.021574][T12561] Call Trace: [ 694.024879][T12561] dump_stack+0xf5/0x159 [ 694.029268][T12561] dump_header+0xaa/0x449 [ 694.033649][T12561] oom_kill_process.cold+0x10/0x15 [ 694.038828][T12561] out_of_memory+0x231/0xa00 [ 694.043444][T12561] mem_cgroup_out_of_memory+0x128/0x150 [ 694.049121][T12561] try_charge+0xb3a/0xbc0 [ 694.053549][T12561] ? __rcu_read_unlock+0x66/0x3c0 [ 694.058612][T12561] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 694.064081][T12561] ? get_mem_cgroup_from_mm+0xb6/0x1c0 [ 694.069551][T12561] __memcg_kmem_charge+0xde/0x240 [ 694.074717][T12561] copy_process+0x11d2/0x3b50 [ 694.079426][T12561] _do_fork+0xfe/0x6e0 [ 694.083505][T12561] ? __read_once_size+0x5a/0xe0 [ 694.088369][T12561] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 694.094093][T12561] ? _copy_to_user+0x84/0xb0 [ 694.098694][T12561] __x64_sys_clone+0x12b/0x160 [ 694.103553][T12561] do_syscall_64+0xcc/0x370 [ 694.108075][T12561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 694.113969][T12561] RIP: 0033:0x4587ea [ 694.117951][T12561] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 694.137554][T12561] RSP: 002b:00007fffae844340 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 694.145969][T12561] RAX: ffffffffffffffda RBX: 00007fffae844340 RCX: 00000000004587ea [ 694.153940][T12561] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 694.161913][T12561] RBP: 00007fffae844380 R08: 0000000000000001 R09: 0000000000db9940 [ 694.169901][T12561] R10: 0000000000db9c10 R11: 0000000000000246 R12: 0000000000000001 23:27:26 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, 0x0, 0x0) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) [ 694.177879][T12561] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fffae8443d0 [ 694.187717][T12561] memory: usage 16764kB, limit 0kB, failcnt 49 [ 694.249796][T12561] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 694.271483][T12561] Memory cgroup stats for /syz4: [ 694.271758][T12561] anon 15646720 [ 694.271758][T12561] file 53248 [ 694.271758][T12561] kernel_stack 184320 [ 694.271758][T12561] slab 921600 [ 694.271758][T12561] sock 0 [ 694.271758][T12561] shmem 0 [ 694.271758][T12561] file_mapped 0 [ 694.271758][T12561] file_dirty 0 [ 694.271758][T12561] file_writeback 0 [ 694.271758][T12561] anon_thp 14680064 [ 694.271758][T12561] inactive_anon 0 [ 694.271758][T12561] active_anon 15646720 [ 694.271758][T12561] inactive_file 98304 [ 694.271758][T12561] active_file 0 [ 694.271758][T12561] unevictable 0 [ 694.271758][T12561] slab_reclaimable 405504 [ 694.271758][T12561] slab_unreclaimable 516096 [ 694.271758][T12561] pgfault 45342 [ 694.271758][T12561] pgmajfault 0 [ 694.271758][T12561] workingset_refault 0 [ 694.271758][T12561] workingset_activate 0 23:27:26 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r7) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r8, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r8, &(0x7f00000000c0)=ANY=[], 0x0) r9 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r10 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r10, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r9, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16=r10, @ANYBLOB="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"], 0x3}}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r11, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) [ 694.271758][T12561] workingset_nodereclaim 0 [ 694.271758][T12561] pgrefill 76 [ 694.271758][T12561] pgscan 8261 [ 694.271758][T12561] pgsteal 8252 [ 694.271758][T12561] pgactivate 0 23:27:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a", 0x3f}], 0x3}], 0x1, 0x0) 23:27:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}], 0x1, 0x0, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 694.440310][T12561] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16911,uid=0 [ 694.520998][T12561] Memory cgroup out of memory: Killed process 16911 (syz-executor.4) total-vm:72716kB, anon-rss:4256kB, file-rss:35780kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 694.673519][T12561] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 694.727001][T12561] CPU: 1 PID: 12561 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 694.734953][T12561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.745060][T12561] Call Trace: [ 694.748371][T12561] dump_stack+0xf5/0x159 [ 694.752741][T12561] dump_header+0xaa/0x449 [ 694.757142][T12561] oom_kill_process.cold+0x10/0x15 [ 694.762281][T12561] out_of_memory+0x231/0xa00 [ 694.766970][T12561] mem_cgroup_out_of_memory+0x128/0x150 [ 694.772554][T12561] try_charge+0xb3a/0xbc0 [ 694.776915][T12561] ? __rcu_read_unlock+0x66/0x3c0 [ 694.781953][T12561] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 694.787444][T12561] ? get_mem_cgroup_from_mm+0xb6/0x1c0 [ 694.793432][T12561] __memcg_kmem_charge+0xde/0x240 [ 694.798538][T12561] copy_process+0x11d2/0x3b50 [ 694.803261][T12561] _do_fork+0xfe/0x6e0 [ 694.807342][T12561] ? __read_once_size+0x5a/0xe0 [ 694.812263][T12561] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 694.817996][T12561] ? _copy_to_user+0x84/0xb0 [ 694.822652][T12561] __x64_sys_clone+0x12b/0x160 [ 694.827445][T12561] do_syscall_64+0xcc/0x370 [ 694.831961][T12561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 694.838017][T12561] RIP: 0033:0x4587ea [ 694.841923][T12561] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 694.861574][T12561] RSP: 002b:00007fffae844340 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 694.869995][T12561] RAX: ffffffffffffffda RBX: 00007fffae844340 RCX: 00000000004587ea [ 694.877969][T12561] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 694.885945][T12561] RBP: 00007fffae844380 R08: 0000000000000001 R09: 0000000000db9940 [ 694.893912][T12561] R10: 0000000000db9c10 R11: 0000000000000246 R12: 0000000000000001 [ 694.901881][T12561] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fffae8443d0 [ 694.911934][T12561] memory: usage 12376kB, limit 0kB, failcnt 55 [ 694.918093][T12561] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 694.925298][T12561] Memory cgroup stats for /syz4: [ 694.925513][T12561] anon 11288576 [ 694.925513][T12561] file 53248 [ 694.925513][T12561] kernel_stack 147456 [ 694.925513][T12561] slab 921600 [ 694.925513][T12561] sock 0 [ 694.925513][T12561] shmem 0 [ 694.925513][T12561] file_mapped 0 [ 694.925513][T12561] file_dirty 0 [ 694.925513][T12561] file_writeback 0 [ 694.925513][T12561] anon_thp 10485760 [ 694.925513][T12561] inactive_anon 0 [ 694.925513][T12561] active_anon 11288576 [ 694.925513][T12561] inactive_file 98304 [ 694.925513][T12561] active_file 0 [ 694.925513][T12561] unevictable 0 [ 694.925513][T12561] slab_reclaimable 405504 [ 694.925513][T12561] slab_unreclaimable 516096 [ 694.925513][T12561] pgfault 45342 [ 694.925513][T12561] pgmajfault 0 [ 694.925513][T12561] workingset_refault 0 [ 694.925513][T12561] workingset_activate 0 [ 694.925513][T12561] workingset_nodereclaim 0 [ 694.925513][T12561] pgrefill 76 [ 694.925513][T12561] pgscan 8261 [ 694.925513][T12561] pgsteal 8252 [ 694.925513][T12561] pgactivate 0 [ 695.021901][T12561] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=20674,uid=0 [ 695.037870][T12561] Memory cgroup out of memory: Killed process 20674 (syz-executor.4) total-vm:72980kB, anon-rss:2224kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 695.057816][ T1062] oom_reaper: reaped process 20674 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 695.071831][T12561] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 695.081802][T12561] CPU: 1 PID: 12561 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 695.089725][T12561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.099778][T12561] Call Trace: [ 695.103151][T12561] dump_stack+0xf5/0x159 [ 695.107508][T12561] dump_header+0xaa/0x449 [ 695.111860][T12561] oom_kill_process.cold+0x10/0x15 [ 695.116980][T12561] out_of_memory+0x231/0xa00 [ 695.121600][T12561] mem_cgroup_out_of_memory+0x128/0x150 [ 695.127190][T12561] try_charge+0xb3a/0xbc0 [ 695.131544][T12561] ? __rcu_read_unlock+0x66/0x3c0 [ 695.136586][T12561] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 695.142065][T12561] ? get_mem_cgroup_from_mm+0xb6/0x1c0 [ 695.147544][T12561] __memcg_kmem_charge+0xde/0x240 [ 695.152567][T12561] copy_process+0x11d2/0x3b50 [ 695.157330][T12561] _do_fork+0xfe/0x6e0 [ 695.161421][T12561] ? __read_once_size+0x5a/0xe0 [ 695.166256][T12561] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 695.171970][T12561] ? _copy_to_user+0x84/0xb0 [ 695.176579][T12561] __x64_sys_clone+0x12b/0x160 [ 695.181448][T12561] do_syscall_64+0xcc/0x370 [ 695.185976][T12561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 695.191851][T12561] RIP: 0033:0x4587ea [ 695.195732][T12561] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 695.215363][T12561] RSP: 002b:00007fffae844340 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 695.223764][T12561] RAX: ffffffffffffffda RBX: 00007fffae844340 RCX: 00000000004587ea [ 695.231766][T12561] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 695.239738][T12561] RBP: 00007fffae844380 R08: 0000000000000001 R09: 0000000000db9940 [ 695.247721][T12561] R10: 0000000000db9c10 R11: 0000000000000246 R12: 0000000000000001 [ 695.255678][T12561] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fffae8443d0 [ 695.263852][T12561] memory: usage 10028kB, limit 0kB, failcnt 61 [ 695.270014][T12561] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 695.276967][T12561] Memory cgroup stats for /syz4: [ 695.277307][T12561] anon 9052160 [ 695.277307][T12561] file 53248 [ 695.277307][T12561] kernel_stack 110592 [ 695.277307][T12561] slab 921600 [ 695.277307][T12561] sock 0 [ 695.277307][T12561] shmem 0 [ 695.277307][T12561] file_mapped 0 [ 695.277307][T12561] file_dirty 0 [ 695.277307][T12561] file_writeback 0 [ 695.277307][T12561] anon_thp 8388608 [ 695.277307][T12561] inactive_anon 0 [ 695.277307][T12561] active_anon 9052160 [ 695.277307][T12561] inactive_file 98304 [ 695.277307][T12561] active_file 0 [ 695.277307][T12561] unevictable 0 [ 695.277307][T12561] slab_reclaimable 405504 [ 695.277307][T12561] slab_unreclaimable 516096 [ 695.277307][T12561] pgfault 45342 [ 695.277307][T12561] pgmajfault 0 [ 695.277307][T12561] workingset_refault 0 [ 695.277307][T12561] workingset_activate 0 [ 695.277307][T12561] workingset_nodereclaim 0 [ 695.277307][T12561] pgrefill 76 [ 695.277307][T12561] pgscan 8261 [ 695.277307][T12561] pgsteal 8252 [ 695.277307][T12561] pgactivate 0 [ 695.372433][T12561] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=20587,uid=0 [ 695.387929][T12561] Memory cgroup out of memory: Killed process 20587 (syz-executor.4) total-vm:72980kB, anon-rss:2224kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 695.435791][T12561] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 695.445870][T12561] CPU: 1 PID: 12561 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 695.453760][T12561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.463818][T12561] Call Trace: [ 695.467126][T12561] dump_stack+0xf5/0x159 [ 695.471383][T12561] dump_header+0xaa/0x449 [ 695.475733][T12561] oom_kill_process.cold+0x10/0x15 [ 695.480859][T12561] out_of_memory+0x231/0xa00 [ 695.485468][T12561] mem_cgroup_out_of_memory+0x128/0x150 [ 695.491002][T12561] try_charge+0xb3a/0xbc0 [ 695.495429][T12561] ? __rcu_read_unlock+0x66/0x3c0 [ 695.500477][T12561] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 695.505920][T12561] ? get_mem_cgroup_from_mm+0xb6/0x1c0 [ 695.511360][T12561] __memcg_kmem_charge+0xde/0x240 [ 695.516408][T12561] copy_process+0x11d2/0x3b50 [ 695.521117][T12561] _do_fork+0xfe/0x6e0 [ 695.525201][T12561] ? __read_once_size+0x5a/0xe0 [ 695.530135][T12561] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 695.535934][T12561] ? _copy_to_user+0x84/0xb0 [ 695.540514][T12561] __x64_sys_clone+0x12b/0x160 [ 695.545267][T12561] do_syscall_64+0xcc/0x370 [ 695.549754][T12561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 695.555646][T12561] RIP: 0033:0x4587ea [ 695.559529][T12561] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 695.579178][T12561] RSP: 002b:00007fffae844340 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 695.587642][T12561] RAX: ffffffffffffffda RBX: 00007fffae844340 RCX: 00000000004587ea [ 695.595592][T12561] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 695.603548][T12561] RBP: 00007fffae844380 R08: 0000000000000001 R09: 0000000000db9940 [ 695.611502][T12561] R10: 0000000000db9c10 R11: 0000000000000246 R12: 0000000000000001 [ 695.619508][T12561] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fffae8443d0 [ 695.629436][T12561] memory: usage 7696kB, limit 0kB, failcnt 67 [ 695.636177][T12561] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 695.643065][T12561] Memory cgroup stats for /syz4: [ 695.643290][T12561] anon 6815744 [ 695.643290][T12561] file 53248 [ 695.643290][T12561] kernel_stack 110592 [ 695.643290][T12561] slab 921600 [ 695.643290][T12561] sock 0 [ 695.643290][T12561] shmem 0 [ 695.643290][T12561] file_mapped 0 [ 695.643290][T12561] file_dirty 0 [ 695.643290][T12561] file_writeback 0 [ 695.643290][T12561] anon_thp 6291456 [ 695.643290][T12561] inactive_anon 0 [ 695.643290][T12561] active_anon 6815744 [ 695.643290][T12561] inactive_file 98304 [ 695.643290][T12561] active_file 0 [ 695.643290][T12561] unevictable 0 [ 695.643290][T12561] slab_reclaimable 405504 [ 695.643290][T12561] slab_unreclaimable 516096 [ 695.643290][T12561] pgfault 45342 [ 695.643290][T12561] pgmajfault 0 [ 695.643290][T12561] workingset_refault 0 [ 695.643290][T12561] workingset_activate 0 [ 695.643290][T12561] workingset_nodereclaim 0 [ 695.643290][T12561] pgrefill 76 [ 695.643290][T12561] pgscan 8261 [ 695.643290][T12561] pgsteal 8252 [ 695.643290][T12561] pgactivate 0 [ 695.738286][T12561] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17609,uid=0 [ 695.753993][T12561] Memory cgroup out of memory: Killed process 17609 (syz-executor.4) total-vm:72848kB, anon-rss:2216kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 695.774095][ T1062] oom_reaper: reaped process 17609 (syz-executor.4), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 695.778420][T12561] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 695.798991][T12561] CPU: 1 PID: 12561 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 695.806879][T12561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.816926][T12561] Call Trace: [ 695.820300][T12561] dump_stack+0xf5/0x159 [ 695.824527][T12561] dump_header+0xaa/0x449 [ 695.828845][T12561] oom_kill_process.cold+0x10/0x15 [ 695.834078][T12561] out_of_memory+0x231/0xa00 [ 695.838656][T12561] mem_cgroup_out_of_memory+0x128/0x150 [ 695.844257][T12561] try_charge+0xb3a/0xbc0 [ 695.848591][T12561] ? __rcu_read_unlock+0x66/0x3c0 [ 695.853672][T12561] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 695.859189][T12561] ? get_mem_cgroup_from_mm+0xb6/0x1c0 [ 695.864670][T12561] __memcg_kmem_charge+0xde/0x240 [ 695.869681][T12561] copy_process+0x11d2/0x3b50 [ 695.874353][T12561] _do_fork+0xfe/0x6e0 [ 695.878477][T12561] ? __read_once_size+0x5a/0xe0 [ 695.883312][T12561] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 695.889011][T12561] ? _copy_to_user+0x84/0xb0 [ 695.893674][T12561] __x64_sys_clone+0x12b/0x160 [ 695.898425][T12561] do_syscall_64+0xcc/0x370 [ 695.902932][T12561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 695.908800][T12561] RIP: 0033:0x4587ea [ 695.912782][T12561] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 695.932376][T12561] RSP: 002b:00007fffae844340 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 695.940795][T12561] RAX: ffffffffffffffda RBX: 00007fffae844340 RCX: 00000000004587ea [ 695.948751][T12561] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 695.956703][T12561] RBP: 00007fffae844380 R08: 0000000000000001 R09: 0000000000db9940 [ 695.964659][T12561] R10: 0000000000db9c10 R11: 0000000000000246 R12: 0000000000000001 [ 695.972613][T12561] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fffae8443d0 [ 695.982790][T12561] memory: usage 5344kB, limit 0kB, failcnt 73 [ 695.988880][T12561] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 695.995815][T12561] Memory cgroup stats for /syz4: [ 695.996130][T12561] anon 4608000 [ 695.996130][T12561] file 53248 [ 695.996130][T12561] kernel_stack 73728 [ 695.996130][T12561] slab 921600 [ 695.996130][T12561] sock 0 [ 695.996130][T12561] shmem 0 [ 695.996130][T12561] file_mapped 0 [ 695.996130][T12561] file_dirty 0 [ 695.996130][T12561] file_writeback 0 [ 695.996130][T12561] anon_thp 4194304 [ 695.996130][T12561] inactive_anon 0 [ 695.996130][T12561] active_anon 4608000 [ 695.996130][T12561] inactive_file 98304 [ 695.996130][T12561] active_file 0 [ 695.996130][T12561] unevictable 0 [ 695.996130][T12561] slab_reclaimable 405504 [ 695.996130][T12561] slab_unreclaimable 516096 [ 695.996130][T12561] pgfault 45342 [ 695.996130][T12561] pgmajfault 0 [ 695.996130][T12561] workingset_refault 0 [ 695.996130][T12561] workingset_activate 0 [ 695.996130][T12561] workingset_nodereclaim 0 [ 695.996130][T12561] pgrefill 76 [ 695.996130][T12561] pgscan 8261 [ 695.996130][T12561] pgsteal 8252 [ 695.996130][T12561] pgactivate 0 [ 696.091070][T12561] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=20791,uid=0 [ 696.106635][T12561] Memory cgroup out of memory: Killed process 20791 (syz-executor.4) total-vm:72584kB, anon-rss:2200kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 696.126425][ T1062] oom_reaper: reaped process 20791 (syz-executor.4), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 696.139633][T12561] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 696.149589][T12561] CPU: 0 PID: 12561 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 696.157474][T12561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.167620][T12561] Call Trace: [ 696.170940][T12561] dump_stack+0xf5/0x159 [ 696.175166][T12561] dump_header+0xaa/0x449 [ 696.179531][T12561] oom_kill_process.cold+0x10/0x15 [ 696.184628][T12561] out_of_memory+0x231/0xa00 [ 696.189350][T12561] mem_cgroup_out_of_memory+0x128/0x150 [ 696.194883][T12561] try_charge+0xb3a/0xbc0 [ 696.199239][T12561] ? __rcu_read_unlock+0x66/0x3c0 [ 696.204246][T12561] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 696.209683][T12561] ? get_mem_cgroup_from_mm+0xb6/0x1c0 [ 696.215204][T12561] __memcg_kmem_charge+0xde/0x240 [ 696.220253][T12561] copy_process+0x11d2/0x3b50 [ 696.224994][T12561] _do_fork+0xfe/0x6e0 [ 696.229070][T12561] ? __read_once_size+0x5a/0xe0 [ 696.233903][T12561] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 696.239604][T12561] ? _copy_to_user+0x84/0xb0 [ 696.244232][T12561] __x64_sys_clone+0x12b/0x160 [ 696.248985][T12561] do_syscall_64+0xcc/0x370 [ 696.253549][T12561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 696.259429][T12561] RIP: 0033:0x4587ea [ 696.263355][T12561] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 696.282949][T12561] RSP: 002b:00007fffae844340 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 696.291378][T12561] RAX: ffffffffffffffda RBX: 00007fffae844340 RCX: 00000000004587ea [ 696.299385][T12561] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 696.307348][T12561] RBP: 00007fffae844380 R08: 0000000000000001 R09: 0000000000db9940 [ 696.315298][T12561] R10: 0000000000db9c10 R11: 0000000000000246 R12: 0000000000000001 [ 696.323261][T12561] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fffae8443d0 [ 696.331682][T12561] memory: usage 3028kB, limit 0kB, failcnt 79 [ 696.337802][T12561] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 696.344683][T12561] Memory cgroup stats for /syz4: [ 696.344904][T12561] anon 2367488 [ 696.344904][T12561] file 53248 [ 696.344904][T12561] kernel_stack 73728 [ 696.344904][T12561] slab 921600 [ 696.344904][T12561] sock 0 [ 696.344904][T12561] shmem 0 [ 696.344904][T12561] file_mapped 0 [ 696.344904][T12561] file_dirty 0 [ 696.344904][T12561] file_writeback 0 [ 696.344904][T12561] anon_thp 2097152 [ 696.344904][T12561] inactive_anon 0 [ 696.344904][T12561] active_anon 2367488 [ 696.344904][T12561] inactive_file 98304 [ 696.344904][T12561] active_file 0 [ 696.344904][T12561] unevictable 0 [ 696.344904][T12561] slab_reclaimable 405504 [ 696.344904][T12561] slab_unreclaimable 516096 [ 696.344904][T12561] pgfault 45342 [ 696.344904][T12561] pgmajfault 0 [ 696.344904][T12561] workingset_refault 0 [ 696.344904][T12561] workingset_activate 0 [ 696.344904][T12561] workingset_nodereclaim 0 [ 696.344904][T12561] pgrefill 76 [ 696.344904][T12561] pgscan 8261 [ 696.344904][T12561] pgsteal 8252 [ 696.344904][T12561] pgactivate 0 [ 696.440238][T12561] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=20618,uid=0 [ 696.455765][T12561] Memory cgroup out of memory: Killed process 20618 (syz-executor.4) total-vm:72848kB, anon-rss:2216kB, file-rss:35780kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 696.477127][T12561] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 696.478777][ T1062] oom_reaper: reaped process 20618 (syz-executor.4), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 696.487153][T12561] CPU: 0 PID: 12561 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 696.505970][T12561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.516052][T12561] Call Trace: [ 696.519373][T12561] dump_stack+0xf5/0x159 [ 696.523709][T12561] dump_header+0xaa/0x449 [ 696.528089][T12561] oom_kill_process.cold+0x10/0x15 [ 696.533183][T12561] out_of_memory+0x231/0xa00 [ 696.537762][T12561] mem_cgroup_out_of_memory+0x128/0x150 [ 696.543297][T12561] try_charge+0xb3a/0xbc0 [ 696.547640][T12561] ? __rcu_read_unlock+0x66/0x3c0 [ 696.552644][T12561] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 696.558128][T12561] ? get_mem_cgroup_from_mm+0xb6/0x1c0 [ 696.563609][T12561] __memcg_kmem_charge+0xde/0x240 [ 696.568790][T12561] copy_process+0x11d2/0x3b50 [ 696.573470][T12561] _do_fork+0xfe/0x6e0 [ 696.577522][T12561] ? __read_once_size+0x5a/0xe0 [ 696.582428][T12561] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 696.588127][T12561] ? _copy_to_user+0x84/0xb0 [ 696.592700][T12561] __x64_sys_clone+0x12b/0x160 [ 696.597483][T12561] do_syscall_64+0xcc/0x370 [ 696.601978][T12561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 696.607869][T12561] RIP: 0033:0x4587ea [ 696.611753][T12561] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 696.631388][T12561] RSP: 002b:00007fffae844340 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 696.639776][T12561] RAX: ffffffffffffffda RBX: 00007fffae844340 RCX: 00000000004587ea [ 696.647756][T12561] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 696.655706][T12561] RBP: 00007fffae844380 R08: 0000000000000001 R09: 0000000000db9940 [ 696.663745][T12561] R10: 0000000000db9c10 R11: 0000000000000246 R12: 0000000000000001 [ 696.671694][T12561] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fffae8443d0 [ 696.680312][T12561] memory: usage 676kB, limit 0kB, failcnt 85 [ 696.686339][T12561] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 696.693203][T12561] Memory cgroup stats for /syz4: [ 696.693447][T12561] anon 114688 [ 696.693447][T12561] file 53248 [ 696.693447][T12561] kernel_stack 36864 [ 696.693447][T12561] slab 921600 [ 696.693447][T12561] sock 0 [ 696.693447][T12561] shmem 0 [ 696.693447][T12561] file_mapped 0 [ 696.693447][T12561] file_dirty 0 [ 696.693447][T12561] file_writeback 0 [ 696.693447][T12561] anon_thp 0 [ 696.693447][T12561] inactive_anon 0 [ 696.693447][T12561] active_anon 114688 [ 696.693447][T12561] inactive_file 98304 [ 696.693447][T12561] active_file 0 [ 696.693447][T12561] unevictable 0 [ 696.693447][T12561] slab_reclaimable 405504 [ 696.693447][T12561] slab_unreclaimable 516096 [ 696.693447][T12561] pgfault 45342 [ 696.693447][T12561] pgmajfault 0 [ 696.693447][T12561] workingset_refault 0 [ 696.693447][T12561] workingset_activate 0 [ 696.693447][T12561] workingset_nodereclaim 0 [ 696.693447][T12561] pgrefill 76 [ 696.693447][T12561] pgscan 8261 [ 696.693447][T12561] pgsteal 8252 [ 696.693447][T12561] pgactivate 0 [ 696.787801][T12561] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=12561,uid=0 [ 696.803675][T12561] Memory cgroup out of memory: Killed process 12561 (syz-executor.4) total-vm:72452kB, anon-rss:108kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 696.822246][ T1062] oom_reaper: reaped process 12561 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 23:27:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:29 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r7) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r8, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r8, &(0x7f00000000c0)=ANY=[], 0x0) r9 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r10 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r10, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r9, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16=r10, @ANYBLOB="00012dbd7000fddbdf2506000000100001006e657464657673696d000000100002006e657464657673696d300000080003000300000008000400020000f5eeb4604b911f80df7400080001007063690014000200303030303a30303a31302e300000000008000300030000000800040001000000080001007063690014000200303000303a30303a31302e3000c3ce7c5a000300020000007500040003000000e9ea0d07a3a87170a3725cebf24b79105a72ed8877b84db6961869c5bde853a455f698b0bb3be6fcdee2f933ed9e032c6871485d58ac8be50e851a88e11cb70bc1d0d927917f757d17dcc192765134d8e78166a831ac1840bc6c0a29db14e44a6a97792913beac92979ebc7d362612db9d066664ece339c80e58a53d4f7c2853a0c1bd61c3ab82b1d02671e59dbb3ad99dc3a2775119ae8c3c8df35f35d53d86b36cf7b7f317ae4a99a3b04d8fab2764acb9d3d41550c7f95051ea07b55d186ea3df1fdfb4622b9561c8366b2dc94c7c174f4cc73ee200c34f0efd0dc51ed027f437c3ec1fc7087281bf0d370b37ccf7e521fcb39880984a2d34d3657648c9c06743e3e57af267d6a199bc857d24e7d72e7b41b360c98717602565bb3246d35e3a93dd082dfdb1349758c3d18b6344b142ff4a8c4b3add31156386127922692dd15236444c6307db60892f50cf1f985893b235a0a4cd8cb7c7d979b2f8595575936cf83b0197ba601449302a5aadef8b43359474a5f9282d63f09b0fc3c07dec8e03b6918b955a8463924bf9cdc62767b011ec0a2f77fa5d6155a6a47de5c81f21b8681f38bae900079f5c0fc9ff88f198530af30cc3d42e9c0792b19c5bbc6e5ebb045c272c82ddfbabde93e57d1fb5b6bf466e19a0871c45e88fea0544036763605dfb02c90abc5ab53e6c5c1e885398bd6d45cc7ae01506ec41b256678b3194572b5f97dba0525d9c9d478242de5e71344dac9d77c45149c9"], 0x3}}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r11, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:29 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, 0x0, 0x0) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d3520", 0x44}], 0x3}], 0x1, 0x0) 23:27:29 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:29 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r7) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r8, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r8, &(0x7f00000000c0)=ANY=[], 0x0) r9 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r10 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r10, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r9, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16=r10, @ANYBLOB="00012dbd7000fddbdf2506000000100001006e657464657673696d000000100002006e657464657673696d300000080003000300000008000400020000f5eeb4604b911f80df7400080001007063690014000200303030303a30303a31302e300000000008000300030000000800040001000000080001007063690014000200303000303a30303a31302e3000c3ce7c5a000300020000007500040003000000e9ea0d07a3a87170a3725cebf24b79105a72ed8877b84db6961869c5bde853a455f698b0bb3be6fcdee2f933ed9e032c6871485d58ac8be50e851a88e11cb70bc1d0d927917f757d17dcc192765134d8e78166a831ac1840bc6c0a29db14e44a6a97792913beac92979ebc7d362612db9d066664ece339c80e58a53d4f7c2853a0c1bd61c3ab82b1d02671e59dbb3ad99dc3a2775119ae8c3c8df35f35d53d86b36cf7b7f317ae4a99a3b04d8fab2764acb9d3d41550c7f95051ea07b55d186ea3df1fdfb4622b9561c8366b2dc94c7c174f4cc73ee200c34f0efd0dc51ed027f437c3ec1fc7087281bf0d370b37ccf7e521fcb39880984a2d34d3657648c9c06743e3e57af267d6a199bc857d24e7d72e7b41b360c98717602565bb3246d35e3a93dd082dfdb1349758c3d18b6344b142ff4a8c4b3add31156386127922692dd15236444c6307db60892f50cf1f985893b235a0a4cd8cb7c7d979b2f8595575936cf83b0197ba601449302a5aadef8b43359474a5f9282d63f09b0fc3c07dec8e03b6918b955a8463924bf9cdc62767b011ec0a2f77fa5d6155a6a47de5c81f21b8681f38bae900079f5c0fc9ff88f198530af30cc3d42e9c0792b19c5bbc6e5ebb045c272c82ddfbabde93e57d1fb5b6bf466e19a0871c45e88fea0544036763605dfb02c90abc5ab53e6c5c1e885398bd6d45cc7ae01506ec41b256678b3194572b5f97dba0525d9c9d478242de5e71344dac9d77c45149c9"], 0x3}}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r11, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:29 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r7) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r8, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r8, &(0x7f00000000c0)=ANY=[], 0x0) r9 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r10 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r10, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r9, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16=r10, @ANYBLOB="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"], 0x3}}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r11, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d3520", 0x44}], 0x3}], 0x1, 0x0) 23:27:29 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, 0x0, 0x0) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d3520", 0x44}], 0x3}], 0x1, 0x0) 23:27:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0f", 0x46}], 0x3}], 0x1, 0x0) 23:27:30 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[], 0x0) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:30 executing program 1: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000240)}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1f7d11114e5d6ed86013621d6701a70c3ce4b5fa700f83aea349a501b8f4926c960122bf81c40e3c4d0864b268fa71a491699d044621659396a16561ed76a41714dc23320c090feda54fb9d01dff1b206a98c012356bc30a784b62cf06b391f8f9edad03061b9f03137ef0f339111118b25000f37489ef4238eec20fa85b476da7927e08b507114a00a89b6d3ffbce3e51b3c60c62d9f005a375058de3b1dc8d700a771f9f73f2e4cfe61f900f315f8e6cafe795cfa72aa1589c19474b340244b8b479055d6aa614bdd975cc0b65999c71794d5422aef62a6b616cf32c1ec0964d76a58a73d0c9f9d0481f86485280bd193b1c41df2f6b1d34bc631b9f5d53afa2000000000000a48b8c3d8ef39af607d2c40a190f76574a699a93e40d98d17e8b6dea8c826dc2"], 0x0, 0x127}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:30 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0f", 0x46}], 0x3}], 0x1, 0x0) 23:27:30 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:30 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[], 0x0) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) [ 699.071367][ T100] device bridge_slave_1 left promiscuous mode [ 699.077620][ T100] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.125057][ T100] device bridge_slave_0 left promiscuous mode [ 699.132121][ T100] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.051382][ T100] device hsr_slave_0 left promiscuous mode [ 700.111069][ T100] device hsr_slave_1 left promiscuous mode [ 700.167693][ T100] team0 (unregistering): Port device team_slave_1 removed [ 700.178064][ T100] team0 (unregistering): Port device team_slave_0 removed [ 700.188156][ T100] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 700.255251][ T100] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 700.332893][ T100] bond0 (unregistering): Released all slaves [ 700.458451][T21579] IPVS: ftp: loaded support on port[0] = 21 [ 700.513581][T21579] chnl_net:caif_netlink_parms(): no params data found [ 700.541213][T21579] bridge0: port 1(bridge_slave_0) entered blocking state [ 700.548501][T21579] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.556330][T21579] device bridge_slave_0 entered promiscuous mode [ 700.611556][T21579] bridge0: port 2(bridge_slave_1) entered blocking state [ 700.618659][T21579] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.630125][T21579] device bridge_slave_1 entered promiscuous mode [ 700.654255][T21579] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 700.668282][T21579] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 700.693567][T21579] team0: Port device team_slave_0 added [ 700.700407][T21579] team0: Port device team_slave_1 added [ 700.783831][T21579] device hsr_slave_0 entered promiscuous mode [ 700.834769][T21579] device hsr_slave_1 entered promiscuous mode [ 700.884862][T21579] debugfs: Directory 'hsr0' with parent '/' already present! [ 700.900892][T21579] bridge0: port 2(bridge_slave_1) entered blocking state [ 700.907984][T21579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 700.915324][T21579] bridge0: port 1(bridge_slave_0) entered blocking state [ 700.922533][T21579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 700.968655][T21579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 700.985447][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 700.998517][ T8109] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.007186][ T8109] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.025305][T21579] 8021q: adding VLAN 0 to HW filter on device team0 [ 701.040790][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 701.050058][ T8109] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.057143][ T8109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 701.072370][T19261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 701.080769][T19261] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.087953][T19261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 701.109843][T21579] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 701.120251][T21579] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 701.139931][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 701.149466][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 701.158516][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 701.167089][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 701.175685][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 701.183693][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 701.201341][T21579] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 701.210042][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 701.217833][ T8109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:27:34 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0f", 0x46}], 0x3}], 0x1, 0x0) 23:27:34 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[], 0x0) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:34 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:34 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:34 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd", 0x47}], 0x3}], 0x1, 0x0) 23:27:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd", 0x47}], 0x3}], 0x1, 0x0) 23:27:34 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB], 0x0) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd", 0x47}], 0x3}], 0x1, 0x0) 23:27:34 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB], 0x0) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x2}], 0x1, 0x0) 23:27:35 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000080)=[{}, {}, {}], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(r0, 0x1000000000016) 23:27:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x2}], 0x1, 0x0) 23:27:35 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:35 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB], 0x0) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x1c}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0xffffffff00000000, 0xe, 0x0, &(0x7f0000000440)="2d5d27c22a5b61b20dfe853fe75e", 0x0, 0x4d6e}, 0x28) 23:27:35 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x2}], 0x1, 0x0) 23:27:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {0x0}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:35 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f"], 0x35) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:35 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000080)=[{}, {}, {}], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(r0, 0x1000000000016) 23:27:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {0x0}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x1c}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0xffffffff00000000, 0xe, 0x0, &(0x7f0000000440)="2d5d27c22a5b61b20dfe853fe75e", 0x0, 0x4d6e}, 0x28) 23:27:36 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f"], 0x35) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x1c}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0xffffffff00000000, 0xe, 0x0, &(0x7f0000000440)="2d5d27c22a5b61b20dfe853fe75e", 0x0, 0x4d6e}, 0x28) 23:27:36 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {0x0}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x1c}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0xffffffff00000000, 0xe, 0x0, &(0x7f0000000440)="2d5d27c22a5b61b20dfe853fe75e", 0x0, 0x4d6e}, 0x28) 23:27:36 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:36 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) fcntl$notify(r0, 0x402, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x0, @remote}}}, 0x84) 23:27:36 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f"], 0x35) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:36 executing program 1: 23:27:36 executing program 4: 23:27:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:36 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a7"], 0x4f) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:36 executing program 1: 23:27:37 executing program 2: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:37 executing program 4: 23:27:37 executing program 1: 23:27:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:37 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a7"], 0x4f) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:37 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:37 executing program 1: 23:27:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e7685", 0x1d}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:37 executing program 4: 23:27:37 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a7"], 0x4f) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:37 executing program 1: 23:27:37 executing program 4: 23:27:38 executing program 2: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e7685", 0x1d}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:38 executing program 4: 23:27:38 executing program 1: 23:27:38 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923a"], 0x5c) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:38 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:38 executing program 1: 23:27:38 executing program 4: 23:27:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e7685", 0x1d}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:38 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923a"], 0x5c) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:38 executing program 1: 23:27:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32", 0x2c}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:39 executing program 2: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:39 executing program 4: 23:27:39 executing program 1: 23:27:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32", 0x2c}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:39 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923a"], 0x5c) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:39 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:39 executing program 1: 23:27:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32", 0x2c}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:39 executing program 4: 23:27:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a777", 0x33}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:39 executing program 1: 23:27:39 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f"], 0x63) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:40 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a777", 0x33}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:40 executing program 4: 23:27:40 executing program 1: 23:27:40 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f"], 0x63) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:40 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:40 executing program 4: 23:27:40 executing program 1: 23:27:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a777", 0x33}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:40 executing program 4: 23:27:40 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f"], 0x63) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927", 0x37}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:41 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:41 executing program 1: 23:27:41 executing program 4: 23:27:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927", 0x37}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:41 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a"], 0x66) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:41 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:41 executing program 1: 23:27:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927", 0x37}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:41 executing program 4: 23:27:41 executing program 4: 23:27:41 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a"], 0x66) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:41 executing program 1: 23:27:42 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c5", 0x39}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:42 executing program 4: 23:27:42 executing program 1: 23:27:42 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a"], 0x66) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:42 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:42 executing program 1: 23:27:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c5", 0x39}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:42 executing program 4: 23:27:42 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4"], 0x68) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251ae", 0x3d}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c5", 0x39}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:42 executing program 4: 23:27:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:42 executing program 1: 23:27:42 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x80c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71", 0xb4) sendfile(r0, r1, 0x0, 0x10000) 23:27:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x2}], 0x1, 0x0) 23:27:42 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4"], 0x68) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:42 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x2}], 0x1, 0x0) [ 710.657577][ T25] audit: type=1804 audit(1573169263.088:153): pid=22269 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir164476923/syzkaller.YbKxkZ/23/file0" dev="sda1" ino=16918 res=1 23:27:43 executing program 1: rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000700)={'eql:\xb3\x87\x00\x00\x00\x00\x00\x00\x00\x02\x00', @ifru_flags}) 23:27:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:43 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x215, 0x200007fd, &(0x7f0000e68000), 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000003) 23:27:43 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4"], 0x68) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x2}], 0x1, 0x0) 23:27:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x40, 0x0, 0x40, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x11e632b8, 0x9}, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x2000000000000c) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) read$FUSE(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x215, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0), 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000003) 23:27:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:43 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x215, 0x200007fd, &(0x7f0000e68000), 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000003) 23:27:43 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(0xffffffffffffffff) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:44 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffff7ffffffbff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) keyctl$get_security(0x11, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 23:27:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:44 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(0xffffffffffffffff) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:44 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000c00)={'syz1\x00'}, 0x45c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/166, 0x2e6}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x1000000000000012}, &(0x7f00000002c0)) r3 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) dup2(r1, r0) tkill(r3, 0x15) 23:27:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) [ 711.872331][T22341] input: syz1 as /devices/virtual/input/input15 23:27:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) [ 712.044888][T22352] input: syz1 as /devices/virtual/input/input16 23:27:44 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(0xffffffffffffffff) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:44 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000c00)={'syz1\x00'}, 0x45c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/166, 0x2e6}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x1000000000000012}, &(0x7f00000002c0)) r3 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) dup2(r1, r0) tkill(r3, 0x15) 23:27:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) [ 712.382763][T22366] input: syz1 as /devices/virtual/input/input17 23:27:45 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb", 0x1f}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:45 executing program 4: 23:27:45 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffff7ffffffbff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) keyctl$get_security(0x11, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 23:27:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffff7ffffffbff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) keyctl$get_security(0x11, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 23:27:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb", 0x1f}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb", 0x1f}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:45 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4c", 0x2e}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:46 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:46 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4c", 0x2e}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4c", 0x2e}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffff7ffffffbff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) keyctl$get_security(0x11, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 23:27:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 23:27:46 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af285", 0x36}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af285", 0x36}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:46 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) creat(&(0x7f0000000000)='./bus\x00', 0x0) 23:27:46 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af285", 0x36}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:47 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) creat(&(0x7f0000000000)='./bus\x00', 0x0) 23:27:47 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:47 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffff7ffffffbff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) keyctl$get_security(0x11, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 23:27:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f547", 0x3a}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f547", 0x3a}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f0000000540), 0x2}, 0x20) 23:27:47 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f547", 0x3a}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f0000000540), 0x2}, 0x20) 23:27:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:48 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251", 0x3c}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:48 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r2, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:48 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x14b) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r2 = memfd_create(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sendfile(r2, r3, 0x0, 0x497a) pwritev(r3, &(0x7f0000000480), 0x20000000000000e8, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, r5, 0x104, 0x70bd26, 0x0, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20}, 0x4040808) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0xfffffffffffffffc) rmdir(&(0x7f0000000140)='./bus\x00') write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r6 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000003c0)={0x1d, 0x3a, 0xc, 0xd, 0x3, 0x4, 0x2, 0x3, 0x1}) connect$inet6(r6, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000140)={0x11}, 0x245) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x880, 0x0) sendfile(r1, r4, &(0x7f0000000040), 0x8000fffffffe) 23:27:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffff7ffffffbff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) keyctl$get_security(0x11, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 23:27:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251", 0x3c}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:48 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x14b) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r2 = memfd_create(&(0x7f0000001200)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xa8\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sendfile(r2, r3, 0x0, 0x497a) pwritev(r3, &(0x7f0000000480), 0x20000000000000e8, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, r5, 0x104, 0x70bd26, 0x0, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20}, 0x4040808) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0xfffffffffffffffc) rmdir(&(0x7f0000000140)='./bus\x00') pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) r8 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000003c0)={0x1d, 0x3a, 0xc, 0xd, 0x3, 0x4, 0x2, 0x3, 0x1}) connect$inet6(r8, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x880, 0x0) sendfile(r1, r4, &(0x7f0000000040), 0x8000fffffffe) 23:27:48 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28deee611c2c13aa3e8b504f49fb4ca3be69a3544af2852683f5476251", 0x3c}, {&(0x7f0000000080)="68fa7cb0a0c7089c8fdaf350cb57d825b3d85cdead1b270abccb2e76856341a010b4103c4faba5057ed66b32da1e4d1f20a77711966927e2c58d", 0x3a}, {&(0x7f00000002c0)="df4c1fa6fc6d2fbcaa3638c26892090a5e401e047893db417e9dbc46fed3f8748b74a9444d49187bfe7c14ac9687a399c7c21c72159ba0c5cc92efc9e9345a1e7d5d35208b0fbd73", 0x48}], 0x3}], 0x1, 0x0) 23:27:48 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:48 executing program 5: 23:27:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:49 executing program 1: 23:27:49 executing program 5: 23:27:49 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r2, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:49 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x14b) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r2 = memfd_create(&(0x7f0000001200)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xa8\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sendfile(r2, r3, 0x0, 0x497a) pwritev(r3, &(0x7f0000000480), 0x20000000000000e8, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, r5, 0x104, 0x70bd26, 0x0, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20}, 0x4040808) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0xfffffffffffffffc) rmdir(&(0x7f0000000140)='./bus\x00') pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) r8 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000003c0)={0x1d, 0x3a, 0xc, 0xd, 0x3, 0x4, 0x2, 0x3, 0x1}) connect$inet6(r8, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x880, 0x0) sendfile(r1, r4, &(0x7f0000000040), 0x8000fffffffe) 23:27:49 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:49 executing program 1: 23:27:49 executing program 5: 23:27:49 executing program 5: 23:27:49 executing program 1: 23:27:49 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:49 executing program 5: 23:27:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:50 executing program 1: 23:27:50 executing program 5: 23:27:50 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r2, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:50 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x0, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:50 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x14b) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r2 = memfd_create(&(0x7f0000001200)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xa8\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sendfile(r2, r3, 0x0, 0x497a) pwritev(r3, &(0x7f0000000480), 0x20000000000000e8, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, r5, 0x104, 0x70bd26, 0x0, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20}, 0x4040808) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0xfffffffffffffffc) rmdir(&(0x7f0000000140)='./bus\x00') pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) r8 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000003c0)={0x1d, 0x3a, 0xc, 0xd, 0x3, 0x4, 0x2, 0x3, 0x1}) connect$inet6(r8, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x880, 0x0) sendfile(r1, r4, &(0x7f0000000040), 0x8000fffffffe) 23:27:50 executing program 1: 23:27:50 executing program 5: 23:27:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000700)="8c", 0x1}], 0x1}}], 0x1, 0x0) 23:27:50 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$SIOCAX25DELUID(r0, 0x89e7, 0x0) 23:27:50 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x0, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000640)='threaded\x00', 0x9) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r5 = gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xc, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000540)=r5, 0x12) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:27:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:51 executing program 1: syz_emit_ethernet(0x7e, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @remote}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @local, {[@rr={0x7, 0x17, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @rand_addr, @multicast1, @multicast1]}, @timestamp={0x44, 0x18, 0x0, 0x0, 0x0, [{}, {}, {}, {[@initdev={0xac, 0x1e, 0x0, 0x0}]}]}, @lsrr={0x83, 0x7, 0x0, [@broadcast]}, @ssrr={0x89, 0x7, 0x0, [@rand_addr]}]}}}}}}}, 0x0) 23:27:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000640)='threaded\x00', 0x9) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r5 = gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xc, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000540)=r5, 0x12) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:27:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:51 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x0, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:51 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x14b) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r2 = memfd_create(&(0x7f0000001200)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xa8\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sendfile(r2, r3, 0x0, 0x497a) pwritev(r3, &(0x7f0000000480), 0x20000000000000e8, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, r5, 0x104, 0x70bd26, 0x0, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20}, 0x4040808) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0xfffffffffffffffc) rmdir(&(0x7f0000000140)='./bus\x00') pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) r8 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000003c0)={0x1d, 0x3a, 0xc, 0xd, 0x3, 0x4, 0x2, 0x3, 0x1}) connect$inet6(r8, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x880, 0x0) sendfile(r1, r4, &(0x7f0000000040), 0x8000fffffffe) 23:27:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000640)='threaded\x00', 0x9) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r5 = gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xc, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000540)=r5, 0x12) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:27:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000640)='threaded\x00', 0x9) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r5 = gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xc, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000540)=r5, 0x12) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:27:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000640)='threaded\x00', 0x9) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r5 = gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xc, r4, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000540)=r5, 0x12) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:27:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:51 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x0, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x420000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000280)={0x826, 0x5, 0x4, 'queue0\x00', 0x7fffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(r1, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}, 0x800}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) syz_open_dev$media(0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$adsp(0x0, 0xed, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfe76) r2 = socket$inet(0xa, 0x0, 0x84) sendmmsg$inet(r2, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f00000001c0)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0xa, 0x801, 0x84) sendmmsg$inet(r3, &(0x7f0000001f40)=[{{&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f00000020c0)="0f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)='|', 0x1}], 0x1}}], 0x2, 0x0) fcntl$setflags(r3, 0x2, 0x1) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:27:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6c05e6a3, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='#\n'], 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:27:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:51 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x0, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:51 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) r11 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r11, 0x801c7011, &(0x7f00000001c0)) r12 = openat(r11, 0x0, 0x80040, 0x118) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, 0x0, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r12, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) [ 719.588657][T22712] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.5 proc:/self/fd/3' not defined. 23:27:52 executing program 3: pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:52 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='#\n'], 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:27:52 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x0, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:52 executing program 3: pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:52 executing program 3: pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x420000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000280)={0x826, 0x5, 0x4, 'queue0\x00', 0x7fffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(r1, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}, 0x800}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) syz_open_dev$media(0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$adsp(0x0, 0xed, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfe76) r2 = socket$inet(0xa, 0x0, 0x84) sendmmsg$inet(r2, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f00000001c0)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0xa, 0x801, 0x84) sendmmsg$inet(r3, &(0x7f0000001f40)=[{{&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f00000020c0)="0f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)='|', 0x1}], 0x1}}], 0x2, 0x0) fcntl$setflags(r3, 0x2, 0x1) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:27:52 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x0, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:52 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x420000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000280)={0x826, 0x5, 0x4, 'queue0\x00', 0x7fffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(r1, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}, 0x800}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) syz_open_dev$media(0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$adsp(0x0, 0xed, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfe76) r2 = socket$inet(0xa, 0x0, 0x84) sendmmsg$inet(r2, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f00000001c0)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0xa, 0x801, 0x84) sendmmsg$inet(r3, &(0x7f0000001f40)=[{{&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f00000020c0)="0f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)='|', 0x1}], 0x1}}], 0x2, 0x0) fcntl$setflags(r3, 0x2, 0x1) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:27:52 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) r11 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r11, 0x801c7011, &(0x7f00000001c0)) r12 = openat(r11, 0x0, 0x80040, 0x118) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, 0x0, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r12, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:53 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x0, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:53 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) r11 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r11, 0x801c7011, &(0x7f00000001c0)) r12 = openat(r11, 0x0, 0x80040, 0x118) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, 0x0, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r12, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:53 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x0, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:53 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) r11 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r11, 0x801c7011, &(0x7f00000001c0)) r12 = openat(r11, 0x0, 0x80040, 0x118) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, 0x0, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r12, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:53 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x420000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000280)={0x826, 0x5, 0x4, 'queue0\x00', 0x7fffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(r1, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}, 0x800}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) syz_open_dev$media(0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$adsp(0x0, 0xed, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfe76) r2 = socket$inet(0xa, 0x0, 0x84) sendmmsg$inet(r2, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f00000001c0)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0xa, 0x801, 0x84) sendmmsg$inet(r3, &(0x7f0000001f40)=[{{&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f00000020c0)="0f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)='|', 0x1}], 0x1}}], 0x2, 0x0) fcntl$setflags(r3, 0x2, 0x1) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:27:54 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x0, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x420000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000280)={0x826, 0x5, 0x4, 'queue0\x00', 0x7fffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(r1, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}, 0x800}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) syz_open_dev$media(0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$adsp(0x0, 0xed, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfe76) r2 = socket$inet(0xa, 0x0, 0x84) sendmmsg$inet(r2, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f00000001c0)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0xa, 0x801, 0x84) sendmmsg$inet(r3, &(0x7f0000001f40)=[{{&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f00000020c0)="0f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)='|', 0x1}], 0x1}}], 0x2, 0x0) fcntl$setflags(r3, 0x2, 0x1) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:27:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x420000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000280)={0x826, 0x5, 0x4, 'queue0\x00', 0x7fffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(r1, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}, 0x800}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) syz_open_dev$media(0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$adsp(0x0, 0xed, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfe76) r2 = socket$inet(0xa, 0x0, 0x84) sendmmsg$inet(r2, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f00000001c0)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0xa, 0x801, 0x84) sendmmsg$inet(r3, &(0x7f0000001f40)=[{{&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f00000020c0)="0f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)='|', 0x1}], 0x1}}], 0x2, 0x0) fcntl$setflags(r3, 0x2, 0x1) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:27:54 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x0, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x1ff}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:54 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:54 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r2) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:54 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x0, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:55 executing program 5: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r3 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) openat(0xffffffffffffffff, 0x0, 0x80040, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) 23:27:55 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x0, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:55 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000220001ee000000c5ad34d0187f422780207698624b86f5a21ec000350bae1e1767551f00004982588455858137389942627bcd3cf269bf25864dd87061d2e827174b347055c122eaa3d0180b1d5752890d1f0b0efc4dbbe0e5a85ab583b08e8a25f778d0381e7e98ba2fa078ab41ae9bf2d90500520fa136e453becfac4dc7ebda94567f3ac3b988fe852e6f8be00fd09d7c7ce3e641624c9bc1eca21064e996410ff70dd1b385ff5883f4fbe8c51cf1720d77d600"/199], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@flushpolicy={0x1c, 0x1d, 0x4e326d0846e0c50d, 0x0, 0x0, "", [@policy_type={0xc}]}, 0x1c}, 0x8}, 0x0) 23:27:55 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r2) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 723.042569][T22990] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 723.079075][T22992] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 23:27:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:55 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x0, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:55 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, 0x0, 0x0, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) 23:27:55 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:27:55 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup(r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000000c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 23:27:55 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000440), 0x0) 23:27:56 executing program 5: socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r1, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xaa9ca186, 0x0, 0x0, 0x0) 23:27:56 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x0, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) [ 723.699251][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:27:56 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:56 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000440), 0x0) 23:27:56 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:56 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:56 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) clock_gettime(0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000001b80)={0x10, 0x0, 0x0, 0x81c1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000004}, 0xc043) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x10000, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) [ 724.444573][T23166] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:27:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) [ 724.501521][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:27:57 executing program 4: getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x0) pipe(&(0x7f0000000200)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000001500)='\xa7g\xc7\xbf\xbc\x81o\xe8\x05q\x88,\xe4\f+\x96\xa3+\xa4\xc8\xed9oAv6\xa6\xf6\x84\x03\x00\xa0>I\xac\xe2\xb0mfE\xc7\xdb\x8a\t\xa0\xce}\xfa\xa9\xafA\x9a\xc7\x91\xb9\x0fE\xfe\xb4\xce\xa1\xd5\xa6\xe8\xa9\xa9$`\xd9K\xdd\xf6\xbc\xc1l\xe4\xf6\x04\x14S\x8eh\xa0H\xe4X\xaf\xfe_}', 0xffffffffffffffff) 23:27:57 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:57 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:57 executing program 5: socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r1, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xaa9ca186, 0x0, 0x0, 0x0) 23:27:57 executing program 4: socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r1, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xaa9ca186, 0x0, 0x0, 0x0) [ 724.859297][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:27:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:57 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) [ 724.959545][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:27:57 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:57 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="00012dbd7000fddbdf2506000000100001006e657464657673696d000000100002006e657464657673696d300000080003000300000008000400020000f5eeb4604b911f80df7400080001007063690014000200303030303a30303a31302e300000000008000300030000000800040001000000080001007063690014000200303000303a30303a31302e3000c3ce7c5a000300020000007500040003000000e9ea0d07a3a87170a3725cebf24b79105a72ed8877b84db6961869c5bde853a455f698b0bb3be6fcdee2f933ed9e032c6871485d58ac8be50e851a88e11cb70bc1d0d927917f757d17dcc192765134d8e78166a831ac1840bc6c0a29db14e44a6a97792913beac92979ebc7d362612db9d066664ece339c80e58a53d4f7c2853a0c1bd61c3ab82b1d02671e59dbb3ad99dc3a2775119ae8c3c8df35f35d53d86b36cf7b7f317ae4a99a3b04d8fab2764acb9d3d41550c7f95051ea07b55d186ea3df1fdfb4622b9561c8366b2dc94c7c174f4cc73ee200c34f0efd0dc51ed027f437c3ec1fc7087281bf0d370b37ccf7e521fcb39880984a2d34d3657648c9c06743e3e57af267d6a199bc857d24e7d72e7b41b360c98717602565bb3246d35e3a93dd082dfdb1349758c3d18b6344b142ff4a8c4b3add31156386127922692dd15236444c6307db60892f50cf1f985893b235a0a4cd8cb7c7d979b2f8595575936cf83b0197ba601449302a5aadef8b43359474a5f9282d63f09b0fc3c07dec8e03b6918b955a8463924bf9cdc62767b011ec0a2f77fa5d6155a6a47de5c81f21b8681f38bae900079f5c0fc9ff88f198530af30cc3d42e9c0792b19c5bbc6e5ebb045c272c82ddfbabde93e57d1fb5b6bf466e19a0871c45e88fea0544036763605dfb02c90abc5ab53e6c5c1e885398bd6d45cc7ae01506ec41b256678b3194572b5f97dba0525d9c9d478242de5e71344dac9d77c45149c9"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:57 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:58 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:58 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:58 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:58 executing program 5: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:58 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:58 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r2, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:58 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:58 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="00012dbd7000fddbdf2506000000100001006e657464657673696d000000100002006e657464657673696d300000080003000300000008000400020000f5eeb4604b911f80df7400080001007063690014000200303030303a30303a31302e300000000008000300030000000800040001000000080001007063690014000200303000303a30303a31302e3000c3ce7c5a000300020000007500040003000000e9ea0d07a3a87170a3725cebf24b79105a72ed8877b84db6961869c5bde853a455f698b0bb3be6fcdee2f933ed9e032c6871485d58ac8be50e851a88e11cb70bc1d0d927917f757d17dcc192765134d8e78166a831ac1840bc6c0a29db14e44a6a97792913beac92979ebc7d362612db9d066664ece339c80e58a53d4f7c2853a0c1bd61c3ab82b1d02671e59dbb3ad99dc3a2775119ae8c3c8df35f35d53d86b36cf7b7f317ae4a99a3b04d8fab2764acb9d3d41550c7f95051ea07b55d186ea3df1fdfb4622b9561c8366b2dc94c7c174f4cc73ee200c34f0efd0dc51ed027f437c3ec1fc7087281bf0d370b37ccf7e521fcb39880984a2d34d3657648c9c06743e3e57af267d6a199bc857d24e7d72e7b41b360c98717602565bb3246d35e3a93dd082dfdb1349758c3d18b6344b142ff4a8c4b3add31156386127922692dd15236444c6307db60892f50cf1f985893b235a0a4cd8cb7c7d979b2f8595575936cf83b0197ba601449302a5aadef8b43359474a5f9282d63f09b0fc3c07dec8e03b6918b955a8463924bf9cdc62767b011ec0a2f77fa5d6155a6a47de5c81f21b8681f38bae900079f5c0fc9ff88f198530af30cc3d42e9c0792b19c5bbc6e5ebb045c272c82ddfbabde93e57d1fb5b6bf466e19a0871c45e88fea0544036763605dfb02c90abc5ab53e6c5c1e885398bd6d45cc7ae01506ec41b256678b3194572b5f97dba0525d9c9d478242de5e71344dac9d77c45149c9"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:59 executing program 5: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:59 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="00012dbd7000fddbdf2506000000100001006e657464657673696d000000100002006e657464657673696d300000080003000300000008000400020000f5eeb4604b911f80df7400080001007063690014000200303030303a30303a31302e300000000008000300030000000800040001000000080001007063690014000200303000303a30303a31302e3000c3ce7c5a000300020000007500040003000000e9ea0d07a3a87170a3725cebf24b79105a72ed8877b84db6961869c5bde853a455f698b0bb3be6fcdee2f933ed9e032c6871485d58ac8be50e851a88e11cb70bc1d0d927917f757d17dcc192765134d8e78166a831ac1840bc6c0a29db14e44a6a97792913beac92979ebc7d362612db9d066664ece339c80e58a53d4f7c2853a0c1bd61c3ab82b1d02671e59dbb3ad99dc3a2775119ae8c3c8df35f35d53d86b36cf7b7f317ae4a99a3b04d8fab2764acb9d3d41550c7f95051ea07b55d186ea3df1fdfb4622b9561c8366b2dc94c7c174f4cc73ee200c34f0efd0dc51ed027f437c3ec1fc7087281bf0d370b37ccf7e521fcb39880984a2d34d3657648c9c06743e3e57af267d6a199bc857d24e7d72e7b41b360c98717602565bb3246d35e3a93dd082dfdb1349758c3d18b6344b142ff4a8c4b3add31156386127922692dd15236444c6307db60892f50cf1f985893b235a0a4cd8cb7c7d979b2f8595575936cf83b0197ba601449302a5aadef8b43359474a5f9282d63f09b0fc3c07dec8e03b6918b955a8463924bf9cdc62767b011ec0a2f77fa5d6155a6a47de5c81f21b8681f38bae900079f5c0fc9ff88f198530af30cc3d42e9c0792b19c5bbc6e5ebb045c272c82ddfbabde93e57d1fb5b6bf466e19a0871c45e88fea0544036763605dfb02c90abc5ab53e6c5c1e885398bd6d45cc7ae01506ec41b256678b3194572b5f97dba0525d9c9d478242de5e71344dac9d77c45149c9"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:59 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:27:59 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r2, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:27:59 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:27:59 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:27:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) connect$unix(r1, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4(r2, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, &(0x7f0000000540)=0x1f9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ppoll(&(0x7f0000000100)=[{}], 0x1fd, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x0, 0x0) 23:27:59 executing program 5: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:28:00 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:28:00 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r2, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:28:00 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:28:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept$inet6(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xd44d9793d8de8f3f}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYRES16], 0x1}}, 0x0) 23:28:00 executing program 5: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r4, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r4, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r6) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r7, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(r7, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r6) fcntl$dupfd(r7, 0x0, r0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) r10 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r11 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0xffffffffffffffec, r12, 0x67d256230ec71f33, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x279}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r11, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sync() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) 23:28:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) [ 728.296853][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:28:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) connect$unix(r1, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4(r2, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, &(0x7f0000000540)=0x1f9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ppoll(&(0x7f0000000100)=[{}], 0x1fd, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x0, 0x0) 23:28:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:28:00 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r4, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000280)=""/4096) 23:28:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f00000000c0)=""/204, 0xcc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:28:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="b50eccc397edb7b4459f127133af7202f4362706b794d49269e47272fb32fb28de", 0x21}], 0x1}], 0x1, 0x0) 23:28:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6c05e6a3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c2000041ea0008004500001c0000000000119078ac1e0001e000000100004e2100089420b56068c30fd381739359da1430a09e55dc8860c9465e26c717580640d7f040c72be236a14735a0169b874db7cbf9de32fc998bcd8c2fe78133042235c41da2e4b8895c"], 0x0) 23:28:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="858406b41be47978372a5db6093bf03325a80332d95574eda324deca", 0x1c, r0) keyctl$read(0xb, r1, 0x0, 0x0) 23:28:01 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x100000000000e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x0, 0x8}) 23:28:01 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}, {0x20, 'security.evm\x00'}]}, 0x1e) close(r0) r1 = accept(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000001280)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c2073656375726974792e65766d000ac75062e282b615589db419bc4c411455812a1397c35d8f843836d8f75164921383b08b40872dbf08945f35e5ef8ac793a70bd4c6ce9f3772f03ed6a9923aefaf360bd85c6f02633a54f4a8"], 0x69) close(r2) accept(r2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x0, [0x3, 0x3, 0x0, 0x40000, 0x3, 0x0, 0x7f, 0x2]}, 0x5c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f0000001300)=@generic, &(0x7f00000001c0)=0x80) recvmmsg(r3, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000001380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/4096) [ 729.021495][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 729.053214][ T7976] ================================================================== [ 729.061370][ T7976] BUG: KCSAN: data-race in fsnotify / fsnotify_detach_connector_from_object [ 729.070028][ T7976] [ 729.072372][ T7976] write to 0xffff8880a9964694 of 4 bytes by task 21207 on cpu 1: [ 729.080100][ T7976] fsnotify_detach_connector_from_object+0xb8/0x210 [ 729.086693][ T7976] fsnotify_put_mark+0x2e9/0x3b0 [ 729.091643][ T7976] __x64_sys_inotify_rm_watch+0xd7/0x130 [ 729.097289][ T7976] do_syscall_64+0xcc/0x370 [ 729.101811][ T7976] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 729.107778][ T7976] [ 729.110124][ T7976] read to 0xffff8880a9964694 of 4 bytes by task 7976 on cpu 0: [ 729.117673][ T7976] fsnotify+0x17f/0x7d0 [ 729.121842][ T7976] __fput+0x3aa/0x520 [ 729.125832][ T7976] ____fput+0x1f/0x30 [ 729.129815][ T7976] task_work_run+0xf6/0x130 [ 729.134334][ T7976] exit_to_usermode_loop+0x2b4/0x2c0 [ 729.139625][ T7976] do_syscall_64+0x353/0x370 [ 729.144229][ T7976] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 729.150115][ T7976] [ 729.152442][ T7976] Reported by Kernel Concurrency Sanitizer on: [ 729.158609][ T7976] CPU: 0 PID: 7976 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 729.166406][ T7976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.176457][ T7976] ================================================================== [ 729.184518][ T7976] Kernel panic - not syncing: panic_on_warn set ... [ 729.191105][ T7976] CPU: 0 PID: 7976 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 729.198906][ T7976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.208967][ T7976] Call Trace: [ 729.212285][ T7976] dump_stack+0xf5/0x159 [ 729.216543][ T7976] panic+0x210/0x640 [ 729.220456][ T7976] ? vprintk_func+0x8d/0x140 [ 729.225057][ T7976] kcsan_report.cold+0xc/0xe [ 729.229663][ T7976] kcsan_setup_watchpoint+0x3fe/0x410 [ 729.235049][ T7976] ? lo_ioctl+0x154/0xc80 [ 729.239387][ T7976] __tsan_read4+0x145/0x1f0 [ 729.243903][ T7976] fsnotify+0x17f/0x7d0 [ 729.248072][ T7976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.254329][ T7976] ? debug_smp_processor_id+0x4c/0x172 [ 729.259815][ T7976] __fput+0x3aa/0x520 [ 729.263814][ T7976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.270078][ T7976] ____fput+0x1f/0x30 [ 729.274069][ T7976] task_work_run+0xf6/0x130 [ 729.278597][ T7976] exit_to_usermode_loop+0x2b4/0x2c0 [ 729.283903][ T7976] do_syscall_64+0x353/0x370 [ 729.288520][ T7976] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 729.294414][ T7976] RIP: 0033:0x413d90 [ 729.298335][ T7976] Code: 01 f0 ff ff 0f 83 30 1b 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 7d 42 66 00 00 75 14 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff [ 729.317946][ T7976] RSP: 002b:00007ffd148e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 729.326369][ T7976] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000413d90 [ 729.334342][ T7976] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003 [ 729.342319][ T7976] RBP: 0000000000000d20 R08: 0000000000000000 R09: 000000000000000a [ 729.350290][ T7976] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 729.358267][ T7976] R13: 00007ffd148e11a0 R14: 00000000000b1e64 R15: 00007ffd148e11b0 [ 729.367626][ T7976] Kernel Offset: disabled [ 729.371950][ T7976] Rebooting in 86400 seconds..